Analysis
-
max time kernel
448s -
max time network
450s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/07/2024, 21:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/KingOfBread2048/Solara-executor/releases/download/Download/LoaderV8.zip
Resource
win11-20240709-en
Errors
General
-
Target
https://github.com/KingOfBread2048/Solara-executor/releases/download/Download/LoaderV8.zip
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 2084 created 2792 2084 BitLockerToGo.exe 49 PID 1160 created 2792 1160 BitLockerToGo.exe 49 PID 2388 created 2792 2388 BitLockerToGo.exe 49 -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell and hide display window.
pid Process 576 powershell.exe 5188 powershell.exe 6016 powershell.exe 928 powershell.exe 4696 powershell.exe 4704 powershell.exe 3572 powershell.exe 5196 powershell.exe 6016 powershell.exe 928 powershell.exe 4696 powershell.exe 4704 powershell.exe 3572 powershell.exe 5196 powershell.exe 576 powershell.exe 5188 powershell.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 60 IoCs
pid Process 4940 MicrosoftEdgeWebview2Setup.exe 4112 MicrosoftEdgeUpdate.exe 4168 MicrosoftEdgeUpdate.exe 4240 MicrosoftEdgeUpdate.exe 6032 MicrosoftEdgeUpdateComRegisterShell64.exe 3132 MicrosoftEdgeUpdateComRegisterShell64.exe 4356 MicrosoftEdgeUpdateComRegisterShell64.exe 4452 MicrosoftEdgeUpdate.exe 564 MicrosoftEdgeUpdate.exe 5844 MicrosoftEdgeUpdate.exe 3960 MicrosoftEdgeUpdate.exe 6016 MicrosoftEdge_X64_126.0.2592.113.exe 2776 setup.exe 832 setup.exe 2416 MicrosoftEdgeUpdate.exe 5712 msedgewebview2.exe 2628 msedgewebview2.exe 1032 msedgewebview2.exe 2376 msedgewebview2.exe 2172 msedgewebview2.exe 5728 msedgewebview2.exe 728 driver1.exe 6140 msedgewebview2.exe 4704 msedgewebview2.exe 2056 msedgewebview2.exe 1676 msedgewebview2.exe 2560 msedgewebview2.exe 2948 msedgewebview2.exe 5808 msedgewebview2.exe 752 msedgewebview2.exe 2504 msedgewebview2.exe 2852 msedgewebview2.exe 3328 msedgewebview2.exe 4904 msedgewebview2.exe 4888 msedgewebview2.exe 776 MicrosoftEdgeUpdate.exe 2868 MicrosoftEdgeUpdate.exe 6080 driver1.exe 4332 msedgewebview2.exe 3000 msedgewebview2.exe 4476 msedgewebview2.exe 1808 msedgewebview2.exe 1572 msedgewebview2.exe 5288 msedgewebview2.exe 5828 driver1.exe 5204 msedgewebview2.exe 2052 msedgewebview2.exe 4848 msedgewebview2.exe 5560 msedgewebview2.exe 2956 msedgewebview2.exe 3512 msedgewebview2.exe 1760 msedgewebview2.exe 5988 msedgewebview2.exe 4892 msedgewebview2.exe 1612 msedgewebview2.exe 4596 msedgewebview2.exe 4684 msedgewebview2.exe 4904 BGAUpdate.exe 692 MicrosoftEdgeUpdate.exe 5552 driver1.exe -
Loads dropped DLL 64 IoCs
pid Process 4112 MicrosoftEdgeUpdate.exe 4168 MicrosoftEdgeUpdate.exe 4240 MicrosoftEdgeUpdate.exe 6032 MicrosoftEdgeUpdateComRegisterShell64.exe 4240 MicrosoftEdgeUpdate.exe 3132 MicrosoftEdgeUpdateComRegisterShell64.exe 4240 MicrosoftEdgeUpdate.exe 4356 MicrosoftEdgeUpdateComRegisterShell64.exe 4240 MicrosoftEdgeUpdate.exe 4452 MicrosoftEdgeUpdate.exe 564 MicrosoftEdgeUpdate.exe 5844 MicrosoftEdgeUpdate.exe 5844 MicrosoftEdgeUpdate.exe 564 MicrosoftEdgeUpdate.exe 3960 MicrosoftEdgeUpdate.exe 2416 MicrosoftEdgeUpdate.exe 5936 LoaderV8.exe 5712 msedgewebview2.exe 2628 msedgewebview2.exe 5712 msedgewebview2.exe 5712 msedgewebview2.exe 5712 msedgewebview2.exe 1032 msedgewebview2.exe 1032 msedgewebview2.exe 2376 msedgewebview2.exe 2172 msedgewebview2.exe 2376 msedgewebview2.exe 2172 msedgewebview2.exe 1032 msedgewebview2.exe 1032 msedgewebview2.exe 1032 msedgewebview2.exe 1032 msedgewebview2.exe 5728 msedgewebview2.exe 5728 msedgewebview2.exe 5728 msedgewebview2.exe 5712 msedgewebview2.exe 5768 LoaderV8.exe 6140 msedgewebview2.exe 4704 msedgewebview2.exe 2056 msedgewebview2.exe 2056 msedgewebview2.exe 2056 msedgewebview2.exe 1936 LoaderV8.exe 1676 msedgewebview2.exe 2560 msedgewebview2.exe 2948 msedgewebview2.exe 2948 msedgewebview2.exe 2948 msedgewebview2.exe 5808 msedgewebview2.exe 5808 msedgewebview2.exe 4348 LoaderV8.exe 752 msedgewebview2.exe 2504 msedgewebview2.exe 752 msedgewebview2.exe 752 msedgewebview2.exe 752 msedgewebview2.exe 2852 msedgewebview2.exe 3328 msedgewebview2.exe 2852 msedgewebview2.exe 3328 msedgewebview2.exe 4904 msedgewebview2.exe 2852 msedgewebview2.exe 2852 msedgewebview2.exe 2852 msedgewebview2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\!BCILauncher = "\"C:\\Windows\\Temp\\MUBSTemp\\BCILauncher.EXE\" bgaupmi=F69CB75C5A3446908B50B993535BBA02" BGAUpdate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 8 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 LoaderV8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum LoaderV8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 LoaderV8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum LoaderV8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 LoaderV8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum LoaderV8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 LoaderV8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum LoaderV8.exe -
Checks system information in the registry 2 TTPs 22 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 728 set thread context of 2084 728 driver1.exe 141 PID 6080 set thread context of 1160 6080 driver1.exe 170 PID 5828 set thread context of 2388 5828 driver1.exe 193 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\edge_feedback\camera_mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\fil.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\qu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\VisualElements\SmallLogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\identity_proxy\win10\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\km.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\gd.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\ja.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\pa.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Installer\setup.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\delegatedWebFeatures.sccd setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\af.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{339F6F3D-229F-4884-BCDF-45CD5BF8476A}\EDGEMITMP_6C04F.tmp\SETUP.EX_ MicrosoftEdge_X64_126.0.2592.113.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\de.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\am.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\fi.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\fr-CA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\as.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\gu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\kn.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUAD52.tmp\MicrosoftEdgeUpdateBroker.exe MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUAD52.tmp\msedgeupdateres_lv.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUAD52.tmp\msedgeupdateres_quz.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\identity_proxy\resources.pri setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\fr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\bn-IN.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Extensions\external_extensions.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\identity_proxy\canary.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\vi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\zh-CN.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\tt.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\VisualElements\Logo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\te.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\dual_engine_adapter_x64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\identity_proxy\win11\identity_helper.Sparse.Canary.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\onramp.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\ca-Es-VALENCIA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\ca.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\concrt140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\bg.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Sigma\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\lb.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\msedge_elf.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\VisualElements\LogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\ja.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Mu\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\fr.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUAD52.tmp\msedgeupdateres_ml.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\elevation_service.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Trust Protection Lists\Mu\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\lb.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\identity_proxy\resources.pri setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Trust Protection Lists\Mu\Content setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\d3dcompiler_47.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\msvcp140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\Locales\kok.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\identity_proxy\win10\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUAD52.tmp\msedgeupdateres_es-419.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\et.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Locales\kok.pak setup.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5712_1445430765\manifest.fingerprint msedgewebview2.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp msedgewebview2.exe File opened for modification C:\Windows\SystemTemp msedgewebview2.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp msedgewebview2.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5712_1445430765\manifest.json msedgewebview2.exe File opened for modification C:\Windows\SystemTemp msedgewebview2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 4272 2084 WerFault.exe 141 4892 2084 WerFault.exe 141 2848 1160 WerFault.exe 170 4404 1160 WerFault.exe 170 2416 2388 WerFault.exe 193 3496 2388 WerFault.exe 193 -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Detects videocard installed 1 TTPs 4 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3500 wmic.exe 1832 wmic.exe 3328 wmic.exe 4000 wmic.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 3140 tasklist.exe 2236 tasklist.exe 1788 tasklist.exe 4680 tasklist.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
GoLang User-Agent 5 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 157 Go-http-client/1.1 HTTP User-Agent header 171 Go-http-client/1.1 HTTP User-Agent header 196 Go-http-client/1.1 HTTP User-Agent header 141 Go-http-client/1.1 HTTP User-Agent header 143 Go-http-client/1.1 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "60" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9DA54E8E-61A7-4FEB-A84E-CE76BBDB5175}\InprocHandler32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\ProgID\ = "MicrosoftEdgeUpdate.PolicyStatusMachine.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebSvc\CurVer\ = "MicrosoftEdgeUpdate.Update3WebSvc.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\LocalizedString = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.193.5\\msedgeupdate.dll,-3000" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\CLSID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ = "IAppCommand2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\CLSID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.193.5\\MicrosoftEdgeUpdateOnDemand.exe\"" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9DA54E8E-61A7-4FEB-A84E-CE76BBDB5175} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc\CLSID\ = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods\ = "17" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine.1.0\CLSID\ = "{B5977F34-9264-4AC3-9B31-1224827FF6E8}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{513C065E-085A-40C1-B47D-D2F56F9AA0D1}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.193.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\ProgID\ = "MicrosoftEdgeUpdate.PolicyStatusMachineFallback.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9DA54E8E-61A7-4FEB-A84E-CE76BBDB5175}\InprocHandler32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.193.5\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B}\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9DA54E8E-61A7-4FEB-A84E-CE76BBDB5175} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods\ = "16" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32\ = "{513C065E-085A-40C1-B47D-D2F56F9AA0D1}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusMachine.1.0" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\NumMethods\ = "27" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods\ = "13" MicrosoftEdgeUpdateComRegisterShell64.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\LoaderV8.zip:Zone.Identifier firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 5936 LoaderV8.exe 4112 MicrosoftEdgeUpdate.exe 4112 MicrosoftEdgeUpdate.exe 4112 MicrosoftEdgeUpdate.exe 4112 MicrosoftEdgeUpdate.exe 4112 MicrosoftEdgeUpdate.exe 4112 MicrosoftEdgeUpdate.exe 6016 powershell.exe 6016 powershell.exe 6016 powershell.exe 928 powershell.exe 928 powershell.exe 928 powershell.exe 5768 LoaderV8.exe 1936 LoaderV8.exe 2084 BitLockerToGo.exe 2084 BitLockerToGo.exe 492 openwith.exe 492 openwith.exe 492 openwith.exe 492 openwith.exe 4348 LoaderV8.exe 776 MicrosoftEdgeUpdate.exe 776 MicrosoftEdgeUpdate.exe 776 MicrosoftEdgeUpdate.exe 776 MicrosoftEdgeUpdate.exe 4696 powershell.exe 4696 powershell.exe 4696 powershell.exe 4704 powershell.exe 4704 powershell.exe 4704 powershell.exe 1160 BitLockerToGo.exe 1160 BitLockerToGo.exe 4560 openwith.exe 4560 openwith.exe 4560 openwith.exe 4560 openwith.exe 5664 LoaderV8.exe 3572 powershell.exe 3572 powershell.exe 3572 powershell.exe 5196 powershell.exe 5196 powershell.exe 5196 powershell.exe 2388 BitLockerToGo.exe 2388 BitLockerToGo.exe 3344 openwith.exe 3344 openwith.exe 3344 openwith.exe 3344 openwith.exe 2624 LoaderV8.exe 576 powershell.exe 576 powershell.exe 576 powershell.exe 5188 powershell.exe 5188 powershell.exe 5188 powershell.exe 4864 LoaderV8.exe 1620 LoaderV8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5936 LoaderV8.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5712 msedgewebview2.exe 5712 msedgewebview2.exe 5712 msedgewebview2.exe 752 msedgewebview2.exe 4332 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1000 firefox.exe Token: SeDebugPrivilege 1000 firefox.exe Token: SeDebugPrivilege 1000 firefox.exe Token: SeDebugPrivilege 4112 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1000 firefox.exe Token: SeDebugPrivilege 1000 firefox.exe Token: SeDebugPrivilege 1000 firefox.exe Token: SeDebugPrivilege 1000 firefox.exe Token: SeDebugPrivilege 4112 MicrosoftEdgeUpdate.exe Token: SeIncreaseQuotaPrivilege 3500 wmic.exe Token: SeSecurityPrivilege 3500 wmic.exe Token: SeTakeOwnershipPrivilege 3500 wmic.exe Token: SeLoadDriverPrivilege 3500 wmic.exe Token: SeSystemProfilePrivilege 3500 wmic.exe Token: SeSystemtimePrivilege 3500 wmic.exe Token: SeProfSingleProcessPrivilege 3500 wmic.exe Token: SeIncBasePriorityPrivilege 3500 wmic.exe Token: SeCreatePagefilePrivilege 3500 wmic.exe Token: SeBackupPrivilege 3500 wmic.exe Token: SeRestorePrivilege 3500 wmic.exe Token: SeShutdownPrivilege 3500 wmic.exe Token: SeDebugPrivilege 3500 wmic.exe Token: SeSystemEnvironmentPrivilege 3500 wmic.exe Token: SeRemoteShutdownPrivilege 3500 wmic.exe Token: SeUndockPrivilege 3500 wmic.exe Token: SeManageVolumePrivilege 3500 wmic.exe Token: 33 3500 wmic.exe Token: 34 3500 wmic.exe Token: 35 3500 wmic.exe Token: 36 3500 wmic.exe Token: SeIncreaseQuotaPrivilege 3500 wmic.exe Token: SeSecurityPrivilege 3500 wmic.exe Token: SeTakeOwnershipPrivilege 3500 wmic.exe Token: SeLoadDriverPrivilege 3500 wmic.exe Token: SeSystemProfilePrivilege 3500 wmic.exe Token: SeSystemtimePrivilege 3500 wmic.exe Token: SeProfSingleProcessPrivilege 3500 wmic.exe Token: SeIncBasePriorityPrivilege 3500 wmic.exe Token: SeCreatePagefilePrivilege 3500 wmic.exe Token: SeBackupPrivilege 3500 wmic.exe Token: SeRestorePrivilege 3500 wmic.exe Token: SeShutdownPrivilege 3500 wmic.exe Token: SeDebugPrivilege 3500 wmic.exe Token: SeSystemEnvironmentPrivilege 3500 wmic.exe Token: SeRemoteShutdownPrivilege 3500 wmic.exe Token: SeUndockPrivilege 3500 wmic.exe Token: SeManageVolumePrivilege 3500 wmic.exe Token: 33 3500 wmic.exe Token: 34 3500 wmic.exe Token: 35 3500 wmic.exe Token: 36 3500 wmic.exe Token: SeDebugPrivilege 3140 tasklist.exe Token: SeDebugPrivilege 6016 powershell.exe Token: SeDebugPrivilege 928 powershell.exe Token: SeIncreaseQuotaPrivilege 5264 wmic.exe Token: SeSecurityPrivilege 5264 wmic.exe Token: SeTakeOwnershipPrivilege 5264 wmic.exe Token: SeLoadDriverPrivilege 5264 wmic.exe Token: SeSystemProfilePrivilege 5264 wmic.exe Token: SeSystemtimePrivilege 5264 wmic.exe Token: SeProfSingleProcessPrivilege 5264 wmic.exe Token: SeIncBasePriorityPrivilege 5264 wmic.exe Token: SeCreatePagefilePrivilege 5264 wmic.exe Token: SeBackupPrivilege 5264 wmic.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 1000 firefox.exe 5664 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 656 wrote to memory of 1000 656 firefox.exe 81 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 2812 1000 firefox.exe 82 PID 1000 wrote to memory of 668 1000 firefox.exe 83 PID 1000 wrote to memory of 668 1000 firefox.exe 83 PID 1000 wrote to memory of 668 1000 firefox.exe 83 PID 1000 wrote to memory of 668 1000 firefox.exe 83 PID 1000 wrote to memory of 668 1000 firefox.exe 83 PID 1000 wrote to memory of 668 1000 firefox.exe 83 PID 1000 wrote to memory of 668 1000 firefox.exe 83 PID 1000 wrote to memory of 668 1000 firefox.exe 83 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2792
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:492
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://github.com/KingOfBread2048/Solara-executor/releases/download/Download/LoaderV8.zip"1⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://github.com/KingOfBread2048/Solara-executor/releases/download/Download/LoaderV8.zip2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 25751 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef3278c6-8e48-4d09-b979-667660b91f88} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" gpu3⤵PID:2812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2380 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2352 -prefsLen 26671 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {38200518-a6dc-41f6-9038-fa9e6460416b} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" socket3⤵PID:668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3064 -childID 1 -isForBrowser -prefsHandle 3036 -prefMapHandle 3084 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {28ab0e89-1c82-429b-a237-d638870e2d60} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" tab3⤵PID:2100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3796 -childID 2 -isForBrowser -prefsHandle 3780 -prefMapHandle 3776 -prefsLen 31161 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7db9af64-42a2-4d2a-b7f5-a9cab2a9a9ed} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" tab3⤵PID:4644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4476 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4612 -prefMapHandle 4592 -prefsLen 31161 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c699cbf3-3d6e-4842-bdfc-d3d821f64f98} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" utility3⤵
- Checks processor information in registry
PID:6104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5516 -childID 3 -isForBrowser -prefsHandle 5508 -prefMapHandle 5504 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {473f7d6a-2108-461f-9f11-5b6e9d71a493} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" tab3⤵PID:3708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5488 -childID 4 -isForBrowser -prefsHandle 5648 -prefMapHandle 5652 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb503155-563d-4f18-b4ad-b76252cd5977} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" tab3⤵PID:1884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5872 -childID 5 -isForBrowser -prefsHandle 5816 -prefMapHandle 5660 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {147cfe8d-422b-49c4-a1a8-13093de86cf8} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" tab3⤵PID:3612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1484 -childID 6 -isForBrowser -prefsHandle 3624 -prefMapHandle 2644 -prefsLen 30869 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c176cc97-e4b5-44c6-9c69-22f134df75bd} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" tab3⤵PID:5476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6592 -childID 7 -isForBrowser -prefsHandle 6732 -prefMapHandle 6736 -prefsLen 28282 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16402bbd-b761-464e-93bc-1e4042c32504} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" tab3⤵PID:4012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7160 -parentBuildID 20240401114208 -prefsHandle 7164 -prefMapHandle 2624 -prefsLen 30998 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8375cb2e-0fae-4276-8590-74bd5e4069dd} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" rdd3⤵PID:5392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7188 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 7180 -prefMapHandle 7176 -prefsLen 30998 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbc76d82-1c78-4a85-8206-0d1d3098da56} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" utility3⤵
- Checks processor information in registry
PID:1584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7160 -childID 8 -isForBrowser -prefsHandle 7556 -prefMapHandle 7476 -prefsLen 28332 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d3c00a3d-0809-4416-9c60-d7353b0512f8} 1000 "\\.\pipe\gecko-crash-server-pipe.1000" tab3⤵PID:1316
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1712
-
C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:5936 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeC:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4940 -
C:\Program Files (x86)\Microsoft\Temp\EUAD52.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUAD52.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4168
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4240 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:6032
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3132
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4356
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTMuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE5My41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0ie0I4ODAwOUY4LTE3QUYtNDc4NC1CMjYxLTYzQjU5MzVGMEE1OX0iIHVzZXJpZD0ie0NCRkQzRTRFLUQ5M0UtNDA1NC1CRTkyLTVDRDg5NDgxQ0YwMn0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9Ins3MDZBQzg1MC05RUI1LTQ4Q0ItQUZDQi00NDI4M0UxREI1OUF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE0My41NyIgbmV4dHZlcnNpb249IjEuMy4xOTMuNSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTM5MzgzODM1NCIgaW5zdGFsbF90aW1lX21zPSI0MjYiLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:4452
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{B88009F8-17AF-4784-B261-63B5935F0A59}"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:564
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV8.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5936.5468.9138595703716857882⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:5712 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x17c,0x180,0x184,0x158,0x190,0x7ffce18d0148,0x7ffce18d0154,0x7ffce18d01603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2628
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1740,i,1292740019534545054,17413362480679899843,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1752 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1032
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2020,i,1292740019534545054,17413362480679899843,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2036 /prefetch:113⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2196,i,1292740019534545054,17413362480679899843,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:133⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2172
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3448,i,1292740019534545054,17413362480679899843,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3476 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5728
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4580,i,1292740019534545054,17413362480679899843,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4604 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2056
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=2176,i,1292740019534545054,17413362480679899843,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4648 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=4820,i,1292740019534545054,17413362480679899843,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4824 /prefetch:143⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5808
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5264
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:728 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:2084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 5204⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 5284⤵
- Program crash
PID:4892
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM2⤵
- Scheduled Task/Job: Scheduled Task
PID:5912
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Modifies data under HKEY_USERS
PID:5844 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMjMuMC42MzEyLjEwNiIgbmV4dHZlcnNpb249IiIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMTMiIGluc3RhbGxkYXRldGltZT0iMTcyMDU0NTAwNyIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzY1MDE3NjM5NjQ1OTI4OSI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxMTQzMjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUzOTczNDE5MDYiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:3960
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{339F6F3D-229F-4884-BCDF-45CD5BF8476A}\MicrosoftEdge_X64_126.0.2592.113.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{339F6F3D-229F-4884-BCDF-45CD5BF8476A}\MicrosoftEdge_X64_126.0.2592.113.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:6016 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{339F6F3D-229F-4884-BCDF-45CD5BF8476A}\EDGEMITMP_6C04F.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{339F6F3D-229F-4884-BCDF-45CD5BF8476A}\EDGEMITMP_6C04F.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{339F6F3D-229F-4884-BCDF-45CD5BF8476A}\MicrosoftEdge_X64_126.0.2592.113.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2776 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{339F6F3D-229F-4884-BCDF-45CD5BF8476A}\EDGEMITMP_6C04F.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{339F6F3D-229F-4884-BCDF-45CD5BF8476A}\EDGEMITMP_6C04F.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{339F6F3D-229F-4884-BCDF-45CD5BF8476A}\EDGEMITMP_6C04F.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.113 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff60f10aa40,0x7ff60f10aa4c,0x7ff60f10aa584⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:832
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTMuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE5My41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0ie0I4ODAwOUY4LTE3QUYtNDc4NC1CMjYxLTYzQjU5MzVGMEE1OX0iIHVzZXJpZD0ie0NCRkQzRTRFLUQ5M0UtNDA1NC1CRTkyLTVDRDg5NDgxQ0YwMn0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9Ins3QjNEMjk5RS1DNkNGLTRGNEUtOUQ1My1GMEMyMTkzODZCMjF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMjYuMC4yNTkyLjExMyIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iOSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTQwOTA2MzM3OCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU0MDkwNjMzNzgiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI3MTMwNzgyNjI1IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuZi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy8wMWEwMmQwZS05ZDhkLTQ3YTMtOGMzNi05YmYzOGRhYmUyMWE_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-PGV2ZW50IGV2ZW50dHlwZT0iNiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNzE0NTg2NzMyMSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5Njc1NyIgc3lzdGVtX3VwdGltZV90aWNrcz0iNzU5NzY4MjYxOCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjgwMSIgZG93bmxvYWRfdGltZV9tcz0iMTcyMTg3IiBkb3dubG9hZGVkPSIxNzMxNDg2MTYiIHRvdGFsPSIxNzMxNDg2MTYiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjQ1MTgyIi8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
PID:2416
-
-
C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5768 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV8.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5768.5788.162683559988859019392⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6140 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x164,0x168,0x16c,0x110,0x174,0x7ffce18d0148,0x7ffce18d0154,0x7ffce18d01603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4704
-
-
-
C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV8.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=1936.5876.168524544000696806542⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x164,0x168,0x16c,0x140,0x174,0x7ffce18d0148,0x7ffce18d0154,0x7ffce18d01603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2084 -ip 20841⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2084 -ip 20841⤵PID:4628
-
C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:4348 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV8.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=4348.3180.154196822698030717422⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:752 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x164,0x168,0x16c,0x140,0x178,0x7ffce18d0148,0x7ffce18d0154,0x7ffce18d01603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2504
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1712,i,8831045733827496443,3554977826224272430,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1708 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1780,i,8831045733827496443,3554977826224272430,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1768 /prefetch:113⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3328
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2120,i,8831045733827496443,3554977826224272430,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:133⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4904
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3592,i,8831045733827496443,3554977826224272430,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3724 /prefetch:13⤵
- Executes dropped EXE
PID:4888
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
PID:1832
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:2236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4696 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵PID:692
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6080 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 4644⤵
- Program crash
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 4604⤵
- Program crash
PID:4404
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:776
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Checks system information in the registry
- Modifies data under HKEY_USERS
PID:2868 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{26ACC4B2-5755-447E-91F0-0DD4250281AF}\BGAUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{26ACC4B2-5755-447E-91F0-0DD4250281AF}\BGAUpdate.exe" --edgeupdate-client --system-level2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4904
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTMuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE5My41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezM5NjhCQUMzLTY1QzgtNEEyNC05RTQ2LTk5Q0UwRUM0RjkzRn0iIHVzZXJpZD0ie0NCRkQzRTRFLUQ5M0UtNDA1NC1CRTkyLTVDRDg5NDgxQ0YwMn0iIGluc3RhbGxzb3VyY2U9InNjaGVkdWxlciIgcmVxdWVzdGlkPSJ7NUZGRjAyODMtQjZERS00ODZCLTlCMUUtMjdGM0Y4MkUwNkJCfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjgiIHBoeXNtZW1vcnk9IjgiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4yMjAwMC40OTMiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7aFZmRGpNZEZHNkZnS3MwTno2ZW1yWUNTZzZUUXZEUG9tb2xSYXlRWEJLND0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7MUZBQjhDRkUtOTg2MC00MTVDLUE2Q0EtQUE3RDEyMDIxOTQwfSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMi4wLjAuMzQiIGxhbmc9IiIgYnJhbmQ9IkVVRkkiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI4NDA1NDIzNTk1IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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_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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iOTAwMjUzOTA1NCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjEwMjUiIGRvd25sb2FkX3RpbWVfbXM9IjU4OTQwIiBkb3dubG9hZGVkPSIxODA0NDQ0OCIgdG90YWw9IjE4MDQ0NDQ4IiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSIxNDEiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Checks system information in the registry
PID:692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1160 -ip 11601⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1160 -ip 11601⤵PID:928
-
C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"1⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:5664 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV8.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5664.1532.6701807191418136052⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:4332 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x164,0x168,0x16c,0x140,0x19c,0x7ffce18d0148,0x7ffce18d0154,0x7ffce18d01603⤵
- Executes dropped EXE
PID:3000
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1784,i,6235716290331101340,7725422042484409026,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1780 /prefetch:23⤵
- Executes dropped EXE
PID:4476
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2020,i,6235716290331101340,7725422042484409026,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2028 /prefetch:113⤵
- Executes dropped EXE
PID:1808
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2232,i,6235716290331101340,7725422042484409026,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:133⤵
- Executes dropped EXE
PID:1572
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3608,i,6235716290331101340,7725422042484409026,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3748 /prefetch:13⤵
- Executes dropped EXE
PID:5288
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
PID:3328
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:1788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3572 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5196
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵PID:2416
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5828 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 4644⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 4604⤵
- Program crash
PID:3496
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2388 -ip 23881⤵PID:4112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2388 -ip 23881⤵PID:648
-
C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"1⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV8.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=2624.1512.89024856962782168772⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:5204 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x168,0x16c,0x170,0x144,0x88,0x7ffce18d0148,0x7ffce18d0154,0x7ffce18d01603⤵
- Executes dropped EXE
PID:2052
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1704,i,3963106822537104851,11900725313004619523,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1700 /prefetch:23⤵
- Executes dropped EXE
PID:4848
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1772,i,3963106822537104851,11900725313004619523,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1760 /prefetch:113⤵
- Executes dropped EXE
PID:5560
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2144,i,3963106822537104851,11900725313004619523,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:133⤵
- Executes dropped EXE
PID:2956
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3564,i,3963106822537104851,11900725313004619523,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:13⤵
- Executes dropped EXE
PID:3512
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4600,i,3963106822537104851,11900725313004619523,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4616 /prefetch:13⤵
- Executes dropped EXE
PID:4892
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --webview-exe-name=LoaderV8.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4672,i,3963106822537104851,11900725313004619523,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4728 /prefetch:13⤵
- Executes dropped EXE
PID:4684
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
PID:4000
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:4680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe\""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5188
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid2⤵PID:2700
-
-
C:\ProgramData\driver1.exeC:\ProgramData\driver1.exe2⤵
- Executes dropped EXE
PID:5552
-
-
C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV8.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=4864.4940.44675307220804275202⤵
- Executes dropped EXE
PID:1760 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x164,0x168,0x16c,0x140,0x174,0x7ffce18d0148,0x7ffce18d0154,0x7ffce18d01603⤵
- Executes dropped EXE
PID:5988
-
-
-
C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"C:\Users\Admin\Downloads\LoaderV8\LoaderV8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV8.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=1620.4248.148065843991437167482⤵
- Executes dropped EXE
PID:1612 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x168,0x16c,0x170,0x144,0x88,0x7ffce18d0148,0x7ffce18d0154,0x7ffce18d01603⤵
- Executes dropped EXE
PID:4596
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa398f055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5664
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.5MB
MD54dda37fd043902a07a4d46dd8b5bc4aa
SHA1aeecafae4cca3b4a1e592d93b045de19d09a328e
SHA256806500bb5e7a3e4a2a84d4d08e97d1872dc7ee8f8c255e3c6c2d39437c9779ac
SHA512903280cf47888fcd491b5aa70ffc4de60458fe8fce6e164a02118308cbd36ef0d2e6ecd418d19242d605f9c516598fe723908e28baf702c4c65a284fabc60111
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{1FAB8CFE-9860-415C-A6CA-AA7D12021940}\2.0.0.34\BGAUpdate.exe
Filesize17.2MB
MD53f208f4e0dacb8661d7659d2a030f36e
SHA107fe69fd12637b63f6ae44e60fdf80e5e3e933ff
SHA256d3c12e642d4b032e2592c2ba6e0ed703a7e43fb424b7c3ab5b2e51b53d1d433b
SHA5126c8fce43d04dd7e7f5c8bf275ba01e24a76531e89cc02f4b2f23ab2086f7cf70f485c4240c5ea41bf61cb7ceee471df7e7bdc1b17dfdd54c22e4b02ff4e14740
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
181KB
MD55679308b2e276bd371798ac8d579b1f9
SHA1eb01158489726d54ff605a884d77931df40098e4
SHA256c9aef2d24f1c77a366b327b869e4103ed8276ea83b2b40942718cc134a1e122f
SHA5129eb5ef48b47444909b10bf7d96d55c47c02814524df6a479e448e9ff50b9a462ac03c99f57258d0ed8fe3665fb286dde0d9be5a47019fb4d9c68da2b2589e898
-
Filesize
200KB
MD5090901ebefc233cc46d016af98be6d53
SHA13c78e621f9921642dbbd0502b56538d4b037d0cd
SHA2567864bb95eb14e0ae1c249759cb44ad746e448007563b7430911755cf17ea5a77
SHA5125e415dc06689f65155a7ea13c013088808a65afff12fef664178b2ea37e48b4736261564d72e02b898ced58bfb5b3a1fcdd2c7136c0d841868ec7f4f1c32e883
-
Filesize
214KB
MD58428e306e866fe7972f05b6be814c1cf
SHA184ea90405d8d797a6deba68fd6a8efae5a461ce1
SHA256855e2f2fab4968261704cab9bae294fb7ec8b9c26e4d1708e29e26c454c7b0af
SHA512bd40fc5fb4eeca9e1671d0a99a7ccd1d1ab3f84abf62e996827a60e471adecf655b5ed146cdaefcb82d29c563e4eeba7c1b2da243218cbca55009064dcad1f21
-
Filesize
260KB
MD564f7ff56af334d91a50068271bed5043
SHA1108209fde87705b03d56759fd41486d22a3e24df
SHA256a98505367c850b6ef6d2df68d24d83643767a6fab8f0dd22cc60509b3363ce51
SHA512b70c1d2a26f59e94b31beb3151f69d7eb9de8841399b618730d94263cc5402f391cd5cfc6621c8666e5e073e6f8c340d6fd3511f1cb1cbbf6ee75312598f56d7
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD5d1175f877ab160902113b3a2250d0d78
SHA17fc668cd9ed31d093f7c88dc4803ce3f3f833796
SHA2565ccf3eedf6f1f57d386cef188f070c72583d9a96ff674ce91e8776ced8e989b5
SHA512ba1fa4f61c3ed3766e6bd0ae95e36d7505774c463ff81b989e64acaf878cfd59fa41109c696ed16a122e68edc2e0c9f96afd9cfbe92bd7351583719b028c1604
-
Filesize
29KB
MD53cd709bc031a8d68c10aaa086406a385
SHA1673fbf3172ec1cee21688423ad49ec3848639d02
SHA25654dc23402365407bff46318ac0c8cb60c165988f4159a654b5d6013e289f888e
SHA51204e51aeed7c535616f1db7f92841bcda2bc22f85eb06a7ffc5b626f9f69be0219a042e8ae4a486a2f753b7f65901a082b81f5ba72113d9df9ef123b32367d7d6
-
Filesize
24KB
MD515abb596e500038ffdf8a1d7d853d979
SHA16f8239859ff806c6ad682639ff43cedb6799e6a6
SHA25619509364513e1849ddc46824c8b3bbc354bfc4b540158e28e18abb10b8537dda
SHA512c4642146979700898ad3adeb0160c8e9d7bb56c1e224a778d400764750c9d9cbd7c4ee52bec0853cc0e577884515bd40a1b0fd643cc0b66b56d472e0bbb1c23e
-
Filesize
26KB
MD561c48f913b2502e56168cdf475d4766a
SHA12bf4c5ffbfa6d5c5eaf84de074f3ad7555b56d5d
SHA2568fd703a50d9cb19e9249cf4a4409da71104c6a16475b9725306cd13c260cefd1
SHA512d8ba17df865bff6e2785986d9a8310ec7b0e530e389bf7baa719e95b7effa84b58c7102d5f9711fbaebdd2bbcb3cd66760f9eeed92c1aeef06b85d3724028d2f
-
Filesize
29KB
MD52ba6aaea03cf5f98f63a400a9ca127ab
SHA1807c98ab6fe2f45fa43a8817f0adf8abeec75641
SHA256509cb950d7f5d8f99adff84e6e381001f14571529571419fd5452b48e24c7291
SHA512d4b91512b586dbc1cd0c63aaa7bf82900ba80de2b3e265b0200f0a4e2bf0c0a3916675fb72f9bc0b4eaa5d9cc07ade94c8210ad2156fea6d3d2416a5cbf98c24
-
Filesize
29KB
MD5d624c5abfca9e775c6d27b636ca460c4
SHA18726c57cf5887367c8aa32a1de5298521d5fe273
SHA2567023866e9644a1edb50f0f388bc3f2aeaab561822e6b7d75ec5c66b151f126c0
SHA51292d0d5605336c329359f7c4aa7eeaf972f21877ac61f377e7a2f3c6d66f5d6882be649b765e4122043212381034b4131d44ae996dfc1df4a2e248babcb076c30
-
Filesize
29KB
MD56ff52c5cdc434e4513c4d4b8ec23e02d
SHA156b7b73e3cf2cf13fa509593f7c5aebb73639b83
SHA256414269530f9ecb045e2049266ee0b58df99ac37de75e0e127899eb3218371555
SHA512adc3b5593a69dcd0a894ed6bc1160fdbb0d0e9e96e83ca4430ef28e9115d6023f54f3e3fac3cba1ff4497e486991dc4e7e40c7b75ce7796a5044f1ccc5411371
-
Filesize
29KB
MD5c52c76a02dbfbadd6d409fcc9df8dd16
SHA1d406010ac12ed41e6cdc75eaa2daa231a1d6df6a
SHA25691843e7eb2f1a9e14f51f2b552d8390cf7846b4406b97ca98b105beb40fc461a
SHA51228b24bbe03f79a7e4ad51e0e15a664cd783b527255ff0952d43086071e494e7e45ae50d8c378f69abb22942eda2e8dcf8421e2922dcff9ff9cb851745750d2ee
-
Filesize
29KB
MD5eea17b09a2a3420ee57db365d5a7afae
SHA1dc43580f87f67a28c6fa0b056f41c2c0c98a054e
SHA256b86d6df0b608cbab18ea53c31a9a17c09c86e90e8592f3269af0517c9756c07d
SHA51253a199b1bd82ddde65fd6c9bb007867bfa3b2c39e07817a7aff39b7596f00a76bc5dc23687c7fb41b75b00b30ddfdb38a76c740c38bfe41dc21e1fa2d698469f
-
Filesize
28KB
MD51a3815be8fc2a375042e271da63aaa8d
SHA1a831ce72e5fe3c9477dee3defc1e8f1d3a11aaa1
SHA256e753e2315e26bc7b8334077846dc91a85fd89f1e483b305af8aaac5b596585db
SHA5129642fdc3cb49c6d0e4b1c4e1d636007234b126f48da1fe77f586cb8f9403bdc786b54d4bcdbc6175214b7d06a1879f2c809d3fb7e1b920ab36b29a12afe92fb4
-
Filesize
30KB
MD5253afd1816718afa7fd3af5b7ecf430d
SHA136e9d69eb57331a676b0cb71492ab35486b68d95
SHA25653325e46247a616a84442abbc914b8fa08b67800ab55d5625e43a58b19d44767
SHA512649b292b80dde95c195b968b51dd168f6f5513b179a35832b5e759795f04e6e6f326a34f6f7db37d12b8c322ccae197455565491c2484b8237c82e1bb2e77ad6
-
Filesize
29KB
MD57653243e1a6fbb6c643dbc5b32701c74
SHA1fc537eccc1da0775d145b21db9474ef2996e383d
SHA2569df1383dfa81c5064acd9130555dbaf2e7413b6e2bc72b1d2340a6013387061c
SHA512d7834c02a3891afbba040c943ed4255041a6c241d76ac138ad0c04baf589aaa355067395c606e910ef6b91d64042bf9f5c39bd01320d9eaf4ef850a24c17d1d8
-
Filesize
28KB
MD5a2c7099965d93899ff0373786c8aad20
SHA1cfb9420e99cc61fb859ccb5d6da9c03332777591
SHA2561343867f317fe3fc5a2328d427737d41964188aba50a9739fd0ec98319fec192
SHA512d2d1cd41bc425a1aa4c491d65ba9c4ced9dcb600f1d60af76151216f8eda310049002e5ca360d1df8f59d6334ad87b950c67a20a6d1c7f8a2ea322c9980b6a8f
-
Filesize
28KB
MD58fc86afdc203086ba9be1286e597881c
SHA16515d925fbfb655465061d8ee9d8914cc4f50f63
SHA256e8dfc22e5a028ad5d423634bf4ed96b90841fda6ff69c35469509f9a988a3269
SHA512cbfcdea1b4cb5f404553ada87de1240a3746306563f5f200582a21be656b43c0a0e5dcf25cd5ac49bbbe72abcf8147e62aa8a5e0a810bd6fbc7a1eab3e6029eb
-
Filesize
29KB
MD5414adfaec51543500e86dec02ee0f88c
SHA10ad5efb3e8b6213a11e71187023193fafc4c3c26
SHA25632684d2337a351ba37411962710983538341012e6526a9129161507aea0a72bd
SHA512fddc2123237a9357667bbe6b91f93b5a9ba276533b9c16d98adfa01045fca375a7aef5cf83e175c55382a387a16062661a4797da81f39881ab379c7863e2b054
-
Filesize
30KB
MD5d263b293ee07e95487f63e7190fb6125
SHA148020bb9e9f49408c1ce280711aa8f7aaa600fe2
SHA256c4a3198c15489ed873dde5f8a6df708cfc4a6d8722f3f1f63793863098509af3
SHA51269a851e77124e55f3ee4e3fde169f647731a514dfd16a22013a0ea520b9d6eb9f2aacc9c48a2a812eb8285f46db1a27d196c409587f4549f4e122fdb59ffe1b6
-
Filesize
31KB
MD58708b47ba556853c927de474534da5d4
SHA1a60c932bef60bef01e7015d889e325524666aeff
SHA256720074fb92fc405dc7a5305e802e2ecb7d948de58c814b0ebb2c02a0052a6894
SHA51258d7f419b26a95c986009af9e235fbaca67bf6b1883d8c586c802262fd9fbeaff56b051bf8de8e26f2e4ddeb803bbd4f87c84b1e02f5a43b6614231c59ab258a
-
Filesize
27KB
MD5511646c2809c41bcea4431e372bc91fb
SHA15b83f1c9de6bfa6f18ccfecf3190a80af310d681
SHA256719a5c47d3452e3dfda300788aafeba963c588cfea31d1fb1021f846bd6742cc
SHA5120b45cadd82dd534ba9d4556498817c712bd608b645faee74034c8c48cc39c13c0a8530826690a5c5ef42eb36e3f15f3b97e75625eea8902f12c21291df4cd211
-
Filesize
27KB
MD5ec991a4becce773db11c6f4e640abacc
SHA1298b5289e2712ab77cecfb727c9c8d47740f6fd3
SHA256800fc7987f7ac32267e84122eb94d8a21b83c481c2a34b03d832d57debc2b930
SHA5123e6066cb89abafe963337bbdc371b941ac21b69ceaa19f394512c84c0c06ce9d03141a146144d24172ab6e94f5900071b5b3f38c49f3a079c03bec24bd0418ec
-
Filesize
29KB
MD59309baaa10c227af2773000a793a3540
SHA155032c43f7a7eafb19bca097e3de430aad3913a4
SHA256a35fa7145fd3bfbc0d71cfe1bdefcb506cd02f0939dbeca83644978af8f896ac
SHA51221a05fe75d6115a7a49e779c9156ec25880393b30f69fdb80dc0dbe1c3bb401790c8e62525c0e6625b141cecb970b8d650527d73d2d86afa5056177957c44c24
-
Filesize
29KB
MD51c48f6a58fabc2b115dab7dccfae763a
SHA1c60db12b55074013293dd332d2736d251beaeb8e
SHA2560f6775450c40baea4e72d1eb45cff7c1daf2ac1210006bf7afcc91975467c086
SHA512a84a0ffba4f389698941a497ca6e63c6c632d2eeca788bcf970ea35f1083076950b59b9baeecab7ae17d06847f4675f748cc25b904b03f679801dfb3e2755c13
-
Filesize
28KB
MD5d591a3987492132f6ccd7968a8176290
SHA178a79e0e3935dee509938c9a3b095ef486283793
SHA25602380099a6a942004b0b0042f071108f4896884d19ec7c4cc1264200a8e0aa6f
SHA5127487a0e63a17cca85a127c8880e33c30fb192fb83bd05dad67cb4a3b9ad6ba84b594194f7126acbfb22ead2c00d3bb776557a0fa012ee1b7d43d88de2c7eabb1
-
Filesize
28KB
MD567624d2a8017a9c5fbaa22c02fb6d1b4
SHA1b39c26cb632d6e9cbdbe6f0490e80c11a94782e4
SHA256eb0033a91d64a80aaa66bd088692a8d089169524253b6286b5604ea1aaf0bc8f
SHA512f2fb8edb244d781a77c67ab85c40f0521ee80f0349ce897860542b6f32e134043afdccd50cd17e86c234000493f5c3b1b75950d1eb12e4d088b9fc7e012f06d0
-
Filesize
27KB
MD50b3cbfb6bc674960c6da5c47689e45d0
SHA1f91aa435a0bb4fefa3f7568d8f7b0e2022fc95f4
SHA256eca2354e58a321a78bcb21c24beefa050758c08e86218c55c12434c8ce715942
SHA5123a0e819ec96ec05bf0eb7119687be1a408330703a3c888e49a19fc0bb8ee62f45b1c9a9f24d7593e0355177445e566d6cba62d0b7d437b139eb08b274d3bf13e
-
Filesize
28KB
MD573650ec3b5bf0ac418d06ff2cad961c5
SHA15580915cc24402c72c49834cd9bfbd7c845de468
SHA2566817e994def058448407b6320f325f75dea6e2e561ffc747d0486a716d08384d
SHA512c08b069993790440f1baed5fbfc07368e9564d9bf0c16007968569b433b0b18ae6e8184f3073d522e92b6a7b4454ac21998b8f4fe80946273710097c659e2639
-
Filesize
29KB
MD56f2865bdc505a8216aadea20c0a0c6a6
SHA1a93b8db9aa8f2b2887ad43fa050f98584e3db06b
SHA25695b158fd84806d0dadb3d9a90f7b8a78040c1ecee5ff4dd266d407848c9f3a77
SHA512fc9ccad02d6c04e6d2e76b06d5cd60c486b4a2ffcca1cdc638cbeceabfeaf258c8dbcd5ea7fd3f7e2d288577c90565de7005c88638531ff24bfbaf2fba704c69
-
Filesize
30KB
MD593aa56aa0165d137e497c4b77965a6b5
SHA15e1396c24c76dcf8dad5d97e57cfed7372e7b8be
SHA256aaeaff8fae26262cdb2ccf1faf84bd202ff2a90d9fc95575770bc53bccee2c54
SHA512adb8e9aaf493a62a930398682522b8e9411a645d85493ba4e601d6f4eebd48fba982c6df8c5d01a78cc135d03bd3aa912fb71c3c8e26d1d99feb898e0a422a42
-
Filesize
30KB
MD5a4aa60f4891441bd2522d577f14164f9
SHA119f8a517c449b65967a1ae8b1b6a7f492ad0199e
SHA2567768c2b03810cdb491986f349992d32717c4c14df6266d5f70fa89aeb01c5a60
SHA5120a26fc4bddbcb0078f9ad0c5c9417b74f7c30c6a20e1272edbc20a3b0db29ea17dbc3c9224d2f131570444ce4fbf6f20b0b96e720d2b53c882b8735f444091c5
-
Filesize
29KB
MD5302403f155be43251104dadaf07f1c1a
SHA12f4a21b1e7aed5792b269ebe7a81dd29c3a6182f
SHA2563b6dd91cdb5cd4abedff8940c8a9e0f38cb3f8c49084ecbfcd59b788229f3230
SHA512742c2bd0cd9bc7fb75ee1fea45e434fcb40aed839f2854e17267382278269dcca640b3599823b0e4d04350bef0a0450bfad627586ee49f031d1922d73bc74fd9
-
Filesize
30KB
MD547fcec572a8eea3510596c079c431412
SHA1732395d8698191610bfb751e1466a868bca9b839
SHA2564a8c39680f188b75691e80ab5938e34aff83639c06a9722e30555c1cb8a927c7
SHA5121f18528128b6675f51a91c137e328ea06009636ef5c1970a8a4816437f445bdbf96428a3d310b04cfaf61d0a4adea7a4efd4f9bbd4dadb3f320366f39e40fc7e
-
Filesize
29KB
MD5492d2c11ad558129c9c687641bfafb33
SHA1c713926e13f062106937419975defd7e69228b35
SHA2560879c36a3c750ac9bdc4d73ed0ffb23d9c67e6d486291d56d3c5bb60073677c4
SHA51208d0e4664f07f05f3dea2dfa3d64815067b41cd63701b948b43016369a64151ae515f8c877460037b0f5306c8b080756321d2d6195fd392d86d0e9cc61bc1856
-
Filesize
28KB
MD5fae86d2dc9b09f0d8c0192e2bb53d929
SHA1e5d0dc95449d533785367d088ef5a357ebb7dc08
SHA2565d0f9f75e78fa5c0b0bd2406d6c671675492d92d3dc2515314bc79ba3132e540
SHA51201c7ae01172d98fc6cbc92510b2bafdc56f794f290139e3bf87952bc98b27b338e31899dafcd36f965e7240133183c5dfd6cf6085468fa779813121a27d7cbbe
-
Filesize
28KB
MD58d88faed698fbd4895ad6786acdea245
SHA188cea6fe82ac4970a2dafd971277d458b5aef61d
SHA256c1b2203965c8fb10f6faf65d591400a2da7443d0cba36aa8bde147e1ff6aa0a1
SHA5120a6eacb240a75135a7c651e524888462be350116ec19522c079fccca31a26904266e38add42eec5ef1036dcaa05ccdf9faf9d3b91923018d1aefbe8d63d1a27f
-
Filesize
29KB
MD5d9f0084ca7d58e6cbc12b7111b9f4be1
SHA1e96bd472daffd3569551f15eb602a7ce66da8935
SHA2562d45ff287b4dfe4db12cf83a88ddca14b560d991ef28dc6f5078b44d2603fd90
SHA512ba7e017b6cfb11a7e1f4a22c28ac8b4d4dc571a91c32ab6d63a87ef9dec334fee0062c5c764c662b6f8f89b80758a7dc1781858d0455ab3eba455c8d83134418
-
Filesize
29KB
MD5aace1b6afd05113ffe736206e32e8544
SHA148fe1f61e565f99ecf6365ddc6c2c24b2f38db5d
SHA256e395b29108a3a93fcf7411311d4f478f847f0d8337d4a2cefd64ae6bbfd21110
SHA512be7ae77ce69e6ada5a6169a0efb858723428084f9b7818482f2eaf7d5243d24b9c8131ea01e3f94cc9766d7462e5dae0ce5437247907f764ecff011c866bfd81
-
Filesize
28KB
MD5469423bc5ecca0db996ad9fe789fd58e
SHA1dc68d62d25ed917f836036911efd5067f9062c18
SHA256a25d798ed22ad51682aa90f66e5cca638ae095f4141eba6ef7ca45eb1ef217f6
SHA512360717c97b2f582843de19d819a5dda2cb2f8090c6542c0d87ae1a27cbf154cfd0b845d7f816ca236e65ce17013bb8ca640a5af2c9e5fe4fef05e94405491df7
-
Filesize
28KB
MD55dbbd22cda9cd2e19aae769dc7b083b0
SHA153fd1812647e5e413531d8e67e7970d3e22dac03
SHA256973c96fdecc4a157782414eebb1b17a94b146efe1a97b707043953d0ff1d03aa
SHA512774a5873117c98096e8826f7b03a8ddfd2cd7a1f815ee855a591f86f68bfd6bdf537ed49c9d4094fe931aa592da3eeefe0ded3625a9b811aa2a55a129dd7d9ec
-
Filesize
30KB
MD52f7b11cd7db9f173d040519ef0336ac3
SHA195e753d8bf61ef56dba6807bf730a42d390da401
SHA2568f7b44e60f4450655d963cec393fff3fab4f283672a8dbc8109d1ad967671171
SHA512ea60bff57fd53ab2cad475d753066d108c2108e41e7e4abb6b1bca153d04e07dfbba386ba73efe9b8a84032c9bb4b35b3c655280b43ee93637c5b388d1dd187f
-
Filesize
25KB
MD554519f24fcf06916c6386f642ebaf8a5
SHA12a33c7770c49bb3046a2a78a0457d6dcb3a23f02
SHA2561b0adf22a09097ce9ac5d102e0f102e6d3f2238c21b6d38fbec3c269bbf87c44
SHA512704684c706c9a40cdae8a68615a8a9782b29d177bb5c58e8c01e37c139296d6f1d48a446ec211d746aaf341b06a9148e246dd79b0a8a9098de0f66c68ae74eef
-
Filesize
24KB
MD512de274382418dd99d1125101d1d63b6
SHA14a9b0be76a7136f3b64c7bc53724dc2acc798c23
SHA2567e4f333b20f272bd86182fb3fa191e8ac6bc84c301e28886edbcb92e6e5e1eb2
SHA5129b05f97ca079d30560b09ca22efdb314dc7e36cf601d672a260f4c064d7841776891374a18d8ba1fcb4238fb854187b95c2d5643f428277e076b734ff477267c
-
Filesize
29KB
MD5e0eacb57da5404523e0351b0cc24c648
SHA149ce11a94c2751b7c44914ceda1627fb63651199
SHA2561a269d41990cc81b01b77f0981ff4e9ee31fab50cbe9f0ef437044b40ff72c79
SHA512735c37d267091491f55d80837bc4879a7a2d6dfaec6c3d2873770cd7706a39f29672eefa2f8a27c6038f84069517a8172cf929f48e637a9c65803e5f49525d54
-
Filesize
28KB
MD5f1c5f5604f5c2c0cfdc696866f60c6c3
SHA125643fc3eef898f4288205c711b693daaf8e78ee
SHA256e46eb23160f9e87a0d5aab8fee0e1d1aafe7299964864a2c59e9b9f718105406
SHA5120b562af8b178af10af225649e6c043bb848cfff81a5fa19cac9614eb8f793a97de25aab302bba69c7c35353dfd62baa0cadcc3635c773be1fc10d180241dab44
-
Filesize
27KB
MD564ad801a1ae3d24396147603cd5e8b41
SHA1e9bade01b12321017c450990294b40232c3f7e92
SHA25643dc5c7067bf4af7e8b67b472ee73143b74f4e65efa51e9049476b5bec568645
SHA51237c761400fbade30b06cbb036a288fa9585ed2e067834ff62230097151a4c923118811a79b126a775a15f08238fc957582b3ac41c30d2834d2a7d2ca6dd449a1
-
Filesize
29KB
MD5b772db9d925f936765055000bb2a4467
SHA13c85a28a6dc67e376cb72e25064a5e775b8fef87
SHA256df7dc4e535280090722edfea9f3de3197d1e35d3c8913ecc33285aeb00977e5b
SHA51200c732875c30a4d8dab0582fd9255d9963fdeb0e334f75394b6992c9a0620a7a549ef58076f75bc13b41855b356db08b49959d65695ae859b64f4c3caf6c4b0a
-
Filesize
23KB
MD5149ebf8a4922f050b73f3fb40519d0d3
SHA1141e3cff4b20cce5e3d667d9b56826a5947b040d
SHA2566d42d10a0e2f8cdfcc5fedeb52ac351c2a28e80d2e9e4c59b5a68ff5c258f418
SHA51265b5488070c58b5593ba8415c3d6834a6aa7bd17f39fe8120b509762860a5386a1a2a975b740bbdd9abcd3477e6ca9bc98eb35ea46cb148eed0527f504f1e737
-
Filesize
28KB
MD5b618d09cdf4473a17d9041fdf3309682
SHA17a36cee82849e2beadc82b88640ad25bf6eeb0f6
SHA256cf5af46c9f3f5103c291b80754703d7c4f90a34b5a178631b6b018ae737608c7
SHA512788adae6cebf5cbb8502453655f4e09ed22b8176bc071e4af5e82cc52ba34cc11fc6a60e1e5085a6ddeb7d16e4f342c991125c08dc6b1e7b630f65b4a567d346
-
Filesize
30KB
MD52098457eb957f51e0a4d01c0f7742483
SHA15259907d75441a249d7831739a3e425de7a95fac
SHA256aa0b46a2131033a170b893e95a2daf4fc66d0d9bf30dca2e6e22a4aabab51b51
SHA512a014dd1e4d3433c9eba9e98cd3b491a4b9e227cf414d37cae197d5992c57d4583452a1676828b0a44ece02be373dd2a44f6708943c3b6aa1a99dedea9aeb832b
-
Filesize
27KB
MD5f05c5afd8fba163d63a0eadc15ead729
SHA137a09e16164761234dbb12a0ff05051d21dee28f
SHA2568b9e0b55dbbeffb8cfa9b14cc172e8257597aa52414acf6e08392fa5aa1bce70
SHA51244d469976e09694f12335b5c66f49873c75d5caa181b1bb2e0b2cc174c630143cb3f067c5937e020794cdd2a940d86e45ecd8672fb44e3c4a20193c41aa43f4a
-
Filesize
27KB
MD514a6bd067536c13b7bd33830584567fa
SHA147362233c439cf398c2898bbc0ca1bd0b39db55a
SHA25628a8fcdf0639f8a456c741a889a994b5b13fc64ae87e294a67afaf28549bf1d0
SHA5123e03a74b14f3efb9529a2b212f1a2fac5ee5b7f11ae579b1950d1d53e9ac1db7e9424acf58a9a68c9bebec7d2068851a4e9f8f88e5fbfdd16206c159b9301bdf
-
Filesize
28KB
MD53b20fd47caf6b5b640334ec6d5b6ac20
SHA155929aeb391a0fa49daf8c3d281c1a29aee17e47
SHA256d67844a5bc828804efdcdf9d7049ea1723f683ab62bf131d652da2567866087c
SHA512788987f4787eb5945b397f331d8b97d58b0b4089086d67acada92fc9b6b5efa63e603403ca9ce092ae296b0991bb981a4ae8f70f80e81afa2a94b80f8a3b4aab
-
Filesize
28KB
MD59ca6152e78f814483642cd4fd0a99588
SHA1fc1fe8f952dcede8d50aa0d69ca6df2caa8c31b7
SHA2569848ea308d0aa31e282b4e489ede990c15a1e5fbdbea37535b35632275d76aea
SHA5122fcd2d5d29882d6c331940148246aa927a5e0f22de5c1c4555026ff2d08c4086ee60cf60f9eb811ea6abe81e22170a213057b1d1cb316ca80a5c26bd9ee1ef44
-
Filesize
29KB
MD5411336e9b6c676712b17ecff37a143cc
SHA10b8dfb3b553dbc1a488a45028bb90b9a28c72659
SHA25605d6e8db8a70207d3c0d59f755b4b58ccd6229c033250ad01c2401c264ddd0c8
SHA5124e1ab5bd9d71fb6c68f8b5d383a8768da239daabd7dfe33844591e3d321f4ec33d51f3ed30a4403e45aec09760d14e27b0965d4802376a6ad33ce04ece5b6550
-
Filesize
31KB
MD5f76114d0c6d2a027b3b070d68c9db8a2
SHA153e25177cf8ad4fd2eeb91044c02080e833fd241
SHA2566379b5e3aa4e2052779bf1f18c4530abf990278652f8d74b2098dbba913d4129
SHA512ff30f5bd0081ff6a6e76dcf907d71f06a08c7a186d700b10523d275f64406654280f4b8a60d8ec86d3fb8285744ecbbc54a22bbeba7a1436c3c0bd408eb90ecb
-
Filesize
28KB
MD5e642ef3e1a1c30191942ce075dfbb27b
SHA13817fbf611e9c33b7c0c8a4b14849237b589ced4
SHA2562e9f09fdfb84dde494ba09e1e8f40ef34647ebef59065678724f4e8202997cca
SHA5121dd6a6ca7a3f481e0ff5f89daef308111943367c62b71d455dde291383fe1bcd019081d94dee42071c1b90cf68e48fa7b63cf361f42ea420a8e2580c82b19cea
-
Filesize
15KB
MD5fd4c4def7f2c21e6da007af355a1f678
SHA18c656ca5ca3156df81e87b8fe1632a09e1750e44
SHA256218884a252008a48c36221ff335e1fb1bae40c8075a2111fde8f1f633b2532fc
SHA51250536c583fd018969a3cf889a8db9feb31617d8e4130226c230256a17e9103f6b3ece7411d6f9fab6a540b9c8334eb6bd6b8e9296428026475fb3baa9977f9c4
-
Filesize
10.8MB
MD50d96801162f9328e93406310ce13dcd8
SHA11dd705c9eca5bf057ed1ae1d00df266b8d2ee446
SHA25636bfb2c2ee18a261428200382979de5bf383aba6a8e21e3803f206f4a04ca334
SHA5124f4235b8d3b61edf6ee5a8a9170b9f18fa9bc077896b4d54a668bea46763f322bd2fb7924292092b85bf46d69f10d7146863205e6f84e19d540149510e2d27dd
-
Filesize
3.8MB
MD50103abcd1ea54a11eea67f0fd5e4bc6d
SHA192db784dec7b17942ffe2907af09c389d7c4df16
SHA256f8577b487d4f2723d399c24a2ae5766926f78efeb113599cb2e41bf5a4239409
SHA512c2e724669d4b2cdb8eb738952236fe3e411ecdd4a2fe2486b1a557dbab19f54c70ae34d5d33888c792ad1fe75f5b191295de6e93a038855b6be6311ffab050e2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t4hat1k8.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5c4b90fe17176b0238c9806f42b4c93d8
SHA1d2382ddb29c606da56f62120434bbefbfe702692
SHA256a82aa3503084ed7a265bb0f27133d7af3b3aa2a08f728e8cd5f63cdaae12471d
SHA512df9f309b569d8884d167909e7ed3ef2dd866339e2fffe758ac6889b1d56e1489ab1bca894d47e38c790cacf7c5c483d3a36bb111d77f8af58b079c9bf40ab00e
-
Filesize
1.6MB
MD52aeb55b75f68b4ea3f949cae0ceba066
SHA1daf6fe3b0cb87b4e0ad28d650fc9a190ad192b1c
SHA25622484fdf3008a593e7ca188863d423b8b2a345391120ed296ce8b156cfa983ab
SHA5123b6a6d6c87b8d9ab06fac72fa38067df4c7d4385d37d391d7ad58a623215681fc0366621ce3ce5c08af25e11cc468b18844ea5f7c8ccb71473c956c29d20188c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
280B
MD5dc8aa5f0d19c6181654dcf0a7a706f62
SHA11fdc130900a62c3e7242f83b705ec2f457ca9dea
SHA256b1b73e796476b4c85abc95eee81b6d6e163e1057421cece3ae07640fabc2d66e
SHA512492c27305b14da609db10245d1e25c070ded9ce476678c7dce30b4f60bcfd1730fd6f187583d79ca7d8851bd5cd770bfb7322067cf869bffdd8ce2d35246568e
-
Filesize
280B
MD5e5257d2e82363e666980317dc0176938
SHA183461ad5abfb782afa66e4c627811f93adda0987
SHA2560b1eeb59da9db78ee5440fb6a4e560f96ed01ccd9fefb2e02a20dbb26872f98c
SHA512958b82f9882cd871ffc51b9f2776c66739e18fc1e48aa7d85ce542e8babf05d63d874de17fa05417791040b49a8c0709e614233abbd7743ea5430b8e92d48683
-
Filesize
280B
MD53f37f501c000c3572303c4464669e085
SHA14d76e18e104b6df692f7d186a403957863881568
SHA256d1f35afc1e121ea6862f96717a0c8de4e9bec3b3d06085351b7e1d8de27de9fc
SHA5126233582ea581c42a4f207c7769eccb91ed0c7333d21a35e8e94372a4068b67178ed8a0354a41bca79285257b0cdfe8ed7a43dff1ef4f0343ea246af3e0cd1d0d
-
Filesize
280B
MD56e70a1d9055262b41b7a1778130d4ac1
SHA15c225e239d582a073a8b8a8eb09d62515f8bf756
SHA256b09476db31c8bd22a5c49cbd56f5ad18284aebf932eef8c6297fb7b3460a32d8
SHA5128aaa28cb7cd0b031cfe00c02655d126b121014e732f3311c31bc2b56a38e7561417ca32c49638c184f3f353edb0274babe7db7f382560501d5744b74fd8b1352
-
Filesize
280B
MD535715a8155389405cea2d9c4fa5846ef
SHA11f66756dd71b804aff1826f789c61a78eea29af0
SHA256249e986dbec78b6b892254b5e5f6a74e94817c65c6e14b26a5a71e184d3786fe
SHA512e99814a169c36f77686c56570722f558bc857bcb1655285f4ecfdfe5b3c74deac36ca883d7df8dd3ee01cf230d05ad5c1b6a52325ed6cb67a1b5c310f9b8fb70
-
C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Default\2d36c721-2257-4b51-852f-d8d0b25a5aa2.tmp
Filesize6KB
MD5441a09b0dd239f6b6f8c5ed8df7a0ddf
SHA14578c4f87b8495fc318217c2a3b0f7cc68b8268a
SHA256c7a0d561d4223bf5973932938684b0f9f7cbd78331d59dd359307b99c94b4266
SHA51211696a5ac5b85dab788ea56cad1e49da5f81270a23f99e40d033e4e10d00cdc15b7c409760f3f1b2df20d8a22a71cfd2ba722d19bf437e6bac6e698cc0b11b50
-
C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD586ebbf7ec2c7ec9f5245145d4b29b269
SHA1fe8192a88cb05d3df794decdea58cfb886fe777a
SHA2569ca6904f591c1a014f6d06779b4e9e82893ef8b762fccdd921f53c111fa293a0
SHA512e07b230eb0bf46fa9b54d9d2a150b732e7fd98d5db3643834d03e72d49360fbb14878ec30973d453bcd3b261a0ebd128437705a699da3bcf0d48b47b74fd61da
-
C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD530c89036f61d162e5686f1d0c7542e8c
SHA1437a603e04d0623002f0b0253049e6a4281822dd
SHA2568993baf59ec2ff79e265edba352f3fb8200fa19d60223e792a16a4405dcb18d4
SHA5126e424e1af7a619b22b174c07eefc43fd630a211f17e5b837f2374e57a9dc8af730fe10b83fb95a5c2402aaacb5aa1dad7d20b4cec43eed07af1e8c3658b9ded8
-
C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5c712cf9c0fba79a6d65f2936bcde5de4
SHA142c2c4cc582b1a10358c2159be9494fa0108cf01
SHA25683f6a76f6daec32cc03a7013fb4f7798f880d706157746e171156da76258f9ce
SHA5124e818dd63b6d01f3d5def1345fccf0a57e310c2b46b88a8c30a9949ba9e86061dd41646820e7be724747137223bef935c7b44347c851de33e4f43b63c3aa14cb
-
C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5ad752a7faea0383eb06620eaea7762c4
SHA11f09968c3a4a5deba0113ed7f6da21e5f3a98503
SHA256ab108e394d49efd11784e37ef302eeee9d4239769f10ca26044a8495ed3fdc3f
SHA5122e4d0022029c943062e17c7750e38a63855278ebf904fd2a26b88f034206b0caf72301dd1433c75730a1c45fdf814ceb692721be27d3bf0effa361187203d09b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Default\Network\24058100-6bf3-4655-b6cb-cbf06051a8b1.tmp
Filesize40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Default\Network\631d9c1d-4306-4b80-b975-a45f27ed64f0.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Roaming\LoaderV8.exe\EBWebView\Default\Network\Network Persistent State~RFe5d30e6.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
188B
MD500906c9c7a0b1e1efaf5da1c38cf5751
SHA10e403c67ff688422821ecc09ccc1c60e79faeb00
SHA256b551b86f039df0da339fecea8c542670c54e9095432a47d86763ffee3b189e7f
SHA51256883ec6094c69bd35faa344b8e965ab89e4373209dbdc17cab051785292bff951e885cfc3c900c9524c20ccc6068795b004a3d2e5ee7399fa51d53beced5228
-
Filesize
188B
MD586da8dfc25a658fc0c23a814899b770e
SHA1fa079eb02bf663549b7722e6e11263075c624cd8
SHA25670fa48f7b37e0fe00646d4efe9b146527a2db57bf5ace03af15a23afc9bb4bc9
SHA512e2612799fecac807e3ddc412459c87f6e173ef624f031406abee1a23e210fa2fb3302bd5df9f81e038c23874bc3fece5166cd27eff7aefa321560cc0d12de39d
-
Filesize
188B
MD5868e79d956a251ff74a37f91946ae8f7
SHA1b6f38b6ee3bb6d6c490ab1df185f2efab4b1c901
SHA2564b244130f6d6e31bce07b334165cb925b59e61768c4e1cccaab5db7312f078b2
SHA512fd4a145c5b6e1bded21157ba370d428d8286345a9db1dd097a174ccebb55ae3fca879b1ce85d283fadc069ebf33c868110276af02b7e4e91741ad22c91d6ac5b
-
Filesize
6KB
MD5942c04a464b2fb8c1c5d7eda1c0e3c4d
SHA135e6de0f9d94602b4fc894bf3d9d0b2c6c7c8160
SHA2568fcf3be4b34220361605b28217b6d6664691c4ec9d4bea1904ad20c549edda57
SHA512f737a9027faa7580c7a3191bfd5d0ceabb94ed3be0de696d43064504989abc06de32541112a936fcf167ba9999df90a6f45898d1e08988362f1096955f6f142d
-
Filesize
7KB
MD56a5e5623e6e9df6d75c9e07fa0c0c96f
SHA19a992e0963b7c3d908252160984217d810b5d913
SHA256d8741110a6503a3eb95f5c57b727c80b3f03f63800d13f303c95ff43a3b0bb56
SHA5121ede8ea8eedcb0321d93a6987fe3b41ff27cb6c9c497af46bde41fea35bead560fb9502083152a4d2598e8a92cfe75c88bad20cbd6a0c8bf9a1ecc7f242b63b4
-
Filesize
6KB
MD5753b6766aa2e72d6b80197c9fba5b6a9
SHA1b69628fdadea86595b63a6d03fb7e395f210bcf2
SHA2565c901bd11c323fd3cf133840781c96ee39f752dfe05b3402a13a76ccffe517e8
SHA5128a57545fd94517abc7d5fff87767e1b2252414a6d656d77df014d400d40b06d8fd9e611ba70e8d39aba164469cde775c80ed68059b0d3bfe024958aee6747d82
-
Filesize
7KB
MD5b9498fb992bd0ee0c9a633210c718039
SHA1ac67135e75df5c3518689e60a2fd551642faad50
SHA2566ad3aa1f73302dff04a7e7f54724191bdc61e13eb5bb60c73f5782f404e83487
SHA512b4f2fb8f9ece516c6dc7b414c3e978c48d2499d2f566eb70fb226ce17cc1495de832a7a901e7ddf8fd09ed5602c7b12ffad9196c2ff835418e0e3fb072371c8b
-
Filesize
6KB
MD598e25a69e419fe8e97f355c1306baf9d
SHA17a5d1850fabd70e829656e6f5f757c5ab9db406e
SHA25609146baa499124c7ce7180a0dfa36122fbec7410231ce3eceee61298c4190ea9
SHA512b3524f6a07615afd69814bc20f5b5185cf04094ae0287d5ecbac8d170ed394fef92c8a306f9065cb241a400fffa5bfad6559d7c838800e601c5cb1a88baa8139
-
Filesize
7KB
MD59f8f7f87d8d336074452f8f404a94c09
SHA1f665bc119839d0c2186b51edee9dbd3db623659a
SHA2561455086bdf25fd8d1ed90e3708558a5f3d2c703fb1c2bcd6caa4b18a158fc612
SHA5121928284fb372d9d551077aed5abda7b464a7ef063f58bb048b7b3ecab4fd4ac847229a8a9112dd604b888c6c3c639029a2bbedb70462a7cbb6996b63fe5fb26b
-
Filesize
7KB
MD50bb867ad644ceb20a175c0ca8755f3d4
SHA1a324473be29b66ab561003d0eaebdcf24d9cfe82
SHA2563c5ac1dee163c890b92f7236343ddfb1d948f05d7dadf6f9df3b09b5644e4cc1
SHA512db8326517a42092cee4bedaa5d9e350371d1920a7501dd940c6ea7a4b7ed4cb157c63772a5234e562cdd820e4ee60632f529df5b2fa4e6ac301a83e6d4915562
-
Filesize
7KB
MD564f43ac7c0dffc18bf2dd93c7a909c5c
SHA1a5822c509734b00b53befe1e66c7b6acedaaba8a
SHA256309e42dc2063f08d62502f29a5705d01645cd2b21c48f92107bc8c8b9d3c659f
SHA512642cb1eeb512a7b71a05886b3c0dc88482d6d8d595c09056d02a689491d753fb06cf41fb9b8d84a4e52dec9af6d5e7798b7de751e8b6176c42de20590b3edd6d
-
Filesize
44KB
MD55a5b50aabe40c163b86243e562dd1e9b
SHA13befbdb4befc9b9123c9b9849d20f8f90f3d92c5
SHA2569256618d86855a3d670603488412f38cad9e59191273b53039366d6b7643d30c
SHA512f6a24af177d5e5628f6fbe22b683d7e2f5718788d7dc0f1566e5fcadc2b2718d7638c3ceea7aeae5c796a9fcef9c59fe2526a78f3115a38b2642c5fcc73d595f
-
Filesize
44KB
MD560092235d50681841e62ef92d8782f27
SHA10044badea0141f4666f19e1ac0630aa68d05e06b
SHA25652477bd678396f9447c86964d3f1e9d932984c0e736dfb8bb33d4c466761ecde
SHA5129cc4efac0ba86c3e2679a332487e59847e9ca8d7eef4293d6e969bc4164fe58d9f93cc81b08f9dedaf1d47049c4ece395d2aecc6ad1eb8e7062d910c06f8be85
-
Filesize
264KB
MD5b3e8823e930ad6b54615d49f957cdfbc
SHA1bcc6ad03016c0461625a3442874aada45beb11d4
SHA2561a0b125853ca423d7cf0d23ea4749ac39ece7ec7aaf2c0046d3614eec175f134
SHA5122a1d26d97f0794b0d6d83d3a6d9b1b965e597db6d6d9797440f57b4f8ed29050b7dd18a2e75df490bc7f7a83dee2e384e5d08220b4bcf3f11ba38891cae23f43
-
Filesize
264KB
MD51a1b76c85cdd21b542ce81f0f09a3b3e
SHA171239914b53a6497d64876a3684f8b11912febe1
SHA25616042c6ffde3075fed75019b00f42909a455a2d70f3a28940a56e13e3699f8e5
SHA512c4ff5dd47d821d9358ef44433559bfe84d1bf627b94397f198c324ef56a4b23951b612412366652318299a4a8cb3a8302d6cb6137b81ce62be22c7c3d82d0615
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
4.0MB
MD53d56be43606033e6370281c3fc92d208
SHA116ec1dfcb9d9121c2a3bc0dba8e7cfede6efdd6e
SHA256513f4e5462dc98348b0e88c30979714a294aa0c337a1b10d1ffb8665b927b3ab
SHA5123ea34e28a46bd57053c73e08256e3bb944f23dba0c9a5e372476a30ad615ef4c4046b059de6fa5e7b907238bfdea0f7f363884d2787a2a08c562159f4707d79e
-
Filesize
16KB
MD5af7a3d4417b811f1f473fafdffd06730
SHA1e78b50b5dde7a0ada470a684f2367d3af2ce45ed
SHA256a9eba485d8a59eaeb549ec61555376576e18d77c61f761e4407d7f6173b2043c
SHA5124066b22b7a985405fb3a65a269c2a189f5e15bbf91c93d43ae3940c63e5f360af55b9879af46da77e2d468bbb98229a9ba87c35d7ed7b0a3fd7f49468345d4dc
-
Filesize
18KB
MD5db118e6e86fb09158179a33107dd4576
SHA1e01d6142dd1369f9d1fff28831163bb524f7b8d0
SHA256cf073fc0b2801332e5601b8fad6bce4944118c8bec74c194192e1a5e2fe99146
SHA51214362fdb9ec90530ae31331ed5ac13a001da54789f2f50f7b1daccdbf7cb899f45b9d4e12d7b0989f8131349c23976c05aa1044f6436da63bf6d317ba40a9fff
-
Filesize
1KB
MD5d8bacb6d3b5c0e9276d2b42519436363
SHA190f69b440154088d1915149f6c2bb750d9188970
SHA256ec0a6e8ac2f0a7bee813d7196ded93cf58dc992eef1cb3a8a0f70f294e8a0eb2
SHA512803772fbdad42e8f8f11d0d587f51192371860cb295bb5dfd91d9e04c02dbec0d836d4fcde2246f120dcb4147960bc11fc26ac4c30c0f519d3e6ef366c269138
-
Filesize
2KB
MD517626a8f8b544da069421af1ba2dbd3a
SHA16fa347fed3b8efbd9eacbf4c89d993f652e878ce
SHA256b77656dba0878ee1baa925500c58a653de8d99f26bdcf03daad6e2c20af55a3b
SHA51227f4fd12cc72941859ca39d3fe3855d108ea176a978ffae70a8d6b50818c115442084c150ad238cd02e5f250bb201ee25d47da0b07eb4db0e10a03e3fe0ecdde
-
Filesize
18KB
MD5e9c4194ddceea75de1dc5e4a81bd0fe7
SHA15075108769d8bce90c6a4178488485ed84711eee
SHA256741c73b20319e19adcfad6c415b6a2cd0bc2a746209b941bcf4ba2c871af7b09
SHA51230e9ff22aaff4580fd5b054125a48a8e5c3a29bb3970c4f26acb57ce7359e2b24d9987a6ff08a036adabba45df62423cb20ae50155362cd109dfaa36940a20b6
-
Filesize
18KB
MD568012c9d375bb7227789769c913ab9e6
SHA11c7cb28c82de2dc3275f6afad8c086c2cd651cbc
SHA25698881fdf2040f6a6c69842509e9a8250d27a26e7b83c65349125ca96395451a2
SHA512180d4dfac065605db40918bd74e51a11750d19f32b84ac0e68518b42919ecfe705f4736f871a3f2233b853af9612c8661ac845fc59d5910e74284944314e5bc1
-
Filesize
3KB
MD5669eceff4b1e06265056af098004c76a
SHA1a6a9661b726d9f9bfc41625a99f6db2eb2361e63
SHA25694dc82913071662b9d1610113ba8ec46ee2500c0f986b9110d2e4ba9b5a30952
SHA5122f32ef83e3ca63cbf88477f937cd8ec28e91335f95eafaa795cdadc4812ee18b2c11feca471d3dc4d692ac594adfa79f9f8034afda78395fe6dea1cd66f45f97
-
Filesize
18KB
MD53eb2146bfb4342aac91874d17cbc6694
SHA1e92b009e7423efacc218c743a0f7d6632ccb26a7
SHA256e3be8d448199ca59318b594a4436da394418948af5ab96c2e9bc0d864964f7be
SHA51281bc86fcd822596475ac74f734d57578bf79e5b75b7b92d22d6578f82473a4ce24d952b589b04f3c15d9d08ab661ee4e628e26f9c78595cbe29c564d1cb02ec2
-
Filesize
18KB
MD5ac4e771521ea7c2acb1b1ed6a4d2b7b9
SHA19915db00c532f03a33510f9f21d984bb93c06d31
SHA25605496626ede06c2e3f6b78f2f945fbad552fe527c2a2fae79a85807503446ee8
SHA5127a5b4a0a8c677cd34a6334e82737bc0302c7dff8e4d7f1d4a65f830dc0c2c86f166bfb37a5e22197283f63df203bf0431cf20a8b5b1c6f83e3f0cb790e7819df
-
Filesize
17KB
MD5e8493210c059b2fe4f86eaf48d09fcda
SHA1b3b6fbcbc427dac4d763fa5eadab17476d68306e
SHA25642a11f264d357a3b589136c2465a21384d93eb2e9671afed01e083994313357f
SHA5126d9ad9666fb6280892399880349e5774f88736a345c82b66a5b7386b22bca3e455b0800d0a512e9ef8e8727458be20630b879c7e6bc9b5bef27c81f37646fcb5
-
Filesize
18KB
MD506ddcd71341e8bb5dc7cc3c253fe76f9
SHA1e07f73815ebd986548d5579ff9dfa27821105f9d
SHA2563a73336687e8b57252c18f4fa4e9bda83e42e97ce7c06514b88aae6d6dc933b8
SHA512c4ae3d62756642a5f817c3d8a44957e6dab5fc2e7b5155e6e1dafaff11836748a9eb08c9757602dc1ea10f701197c4faff960f441eebf8b2fddb98f99780305d
-
Filesize
1KB
MD59f4fcaebbe21f234c12c5ce2b2d00f5c
SHA1f189ae5f993a4de7a3cb11a669216bf198cd1d34
SHA2562136701fd1d4e090e45aaf42d7ba83d8996bffcdba4e40f094d87f5f577325d8
SHA512150e6837cc4e6c0e88a2a827e73afa772d3296d95df87f065bdb688c2c09f9721bbce897ed9086d68c91297007cd9821760b29c1a489f5e505c6222e62141526
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize8KB
MD5b1e94ef1bbddb8ba81c25d5c161446ad
SHA11b285d8602435510ee39805a77c4532068c67d88
SHA256899cc57eab42792546c0d01b794541784a7cd3a97da4090eea8937c8447f1fe1
SHA51285af662d65b7aeeebdd6820ee95ce080278431a3bcbd9457ec6f2501ca508389704e0c750c9692cfede688a75c7055341506a9c39ec5814e4fdacfc98a969162
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize13KB
MD510a2ca781b0832f40def9584c3ff6652
SHA1ad683bc438f0cb39229de575b8ad42b43f87a2cd
SHA256b6f403edbba68d5700a5e5d7e43a51b91a82c877e25489936cf35a2ac7ae0d64
SHA51263e4bc9980213d233734d08f370e95a1aa041b250757f47ab1890da9b9a24bf7110fc77b21b80539d3eaca3bdf1b44ffbfa01f530d4167e43c8183dbba939eb2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize15KB
MD52be2ad61cca84ee21f15cbc2f8992b2a
SHA1165bb0c774b9dede85fde82be26e9454bb87713a
SHA256204ec5a07d19af7df4d1038c39206b851b66556bd3d27b3f263a9a4479c436f0
SHA5126d15f08e4194a26184d1a4a359c10d883e55e2d8403adc383de94cc12e76214daba5d043efdbcbada1a3213a22f02599c020beede826ef4130e2fa743538c887
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\AlternateServices.bin
Filesize8KB
MD5dc70c75302a477218d84f4905f4680f4
SHA183fa1599d1dcf4b68d317d0c89b4369e399f9da7
SHA256c408cd1ba7cba92f739bdcaee09f8cff14d88b3eb48f4a47b616b96bcda73049
SHA512a994471d7c754e3f7028107d6085950e37d94081353cbdb6eb3dcf10101d239d25db62f213e2c55d2899b61e8e4c40bc110f5018d1efbc5d57a879946c200693
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD532e01327169f6e9ea30d35be89c9f97d
SHA11f564e11b53aa7917fc6fd1d7c20c0cbd9acb0bf
SHA2561ffcd9b96ab0864b36e28d630c1d26fa64008bf7c715940c7055e524889a3f2c
SHA5125e720a564bfe5c5515b8efd37ff2dd999a0234c1b53f7e7a125cd565b63f94f8d90f10a19c05238d58866613e6cfef426a83c333fa6f240aa304f30463e329ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\datareporting\glean\db\data.safe.tmp
Filesize45KB
MD5efe448fa98224eeb5b3ad3203c80fff7
SHA1e51be4bcaeb1d9ecfff956d2879e3fb28eff693b
SHA2560e57cf86d2c439186c0aa06faeddfde4b65fd7f160d41eeaa2fc8b36daeeb59e
SHA5122b97bd8ab98f91120531d80efd47e885bd0111f62c4cc31822dd62d403cf6edbd0799d9bdaa980f5101633493126237f478715f6e571a00a1f6a19f30de2b9a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a90d04d95df07a725d5c076359977432
SHA114c47fdb4c1a2e13a9bb81d79bc5c84188e67211
SHA256030af09fc1b34facdebcdadf7f15d884bd4f10649e854e3a057161cc989ba6ac
SHA51204a9b5629f9c6b0bafeb8765631d55025423446cfb85bd344ba7f7bf0052f70ecf3f9e4193bc054f86c2cb1d192a6671b27d808d8280ee071712dd21f3d189eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD58e6ced5e9536517adda50b35ddcdae97
SHA1881a3f126e7c5d0917ce6bbb1be8cdd21aeb4420
SHA2567a49eb4c45dbc0a3275b66fff5cbe0eb1159f51a333a887634bf68ff607c2e68
SHA5128bf274efb84806db33131e77cd66412a1c0f3f7ef51ccdc1055eed1e04f083d0b9b5463c849d7e826bdabe63698d4ef47219c97e2b9cd4431f16e9ac7ed7964a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD58a7a691e6f75dd5b997b6c169b713f03
SHA17934ac06074f01032c8517491c06e766901507cb
SHA256f1d59e81e604f0f27e3b77ced5dda97765ed0154e0f8390bf0027d13d10f88c1
SHA512fe0386673cda6b9b8324202fabb6b9d98500662ac6e0b63a960f59d5df277f8b2a59da8eaa57edfc0d5abc59c59088f829d67b973a1816424134bf67173d55ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD5d749dae0231c684abbe2f95a4610e866
SHA18241fc83c26ec5e232753152347894b9b48af09d
SHA2561d05cc04158096d9ac5017978f7e88884bf5618c3402dd12f39bcc4ed9da17ce
SHA512df697483373909bd7a8723bf93036a7c34b489854f33818327eb51ab2f5c4a0bf1720c9558772e5c2533d2e91211bb08291f3751874955545840c65601904f5f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\datareporting\glean\pending_pings\9358ae6d-c4d6-4e9d-bc71-500bdc2fc5b8
Filesize982B
MD50a73eb115719965dfbf037cd00ae6f03
SHA1ab678f47a5ac2950058225c2750fceaa88653cad
SHA25670c2491fd256ef99d5342f2f15d800e0eae51f8fb1b9aa6c4937a8d643bb2602
SHA512b3ac0d61dd79f6e60a57b71fd07230d1f6db91b40b9770e4af51216ce9e05a95175945bcf26f0a7b4315d6952acd8aa150055ec923c7af5ddcef15ce60853fb4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\datareporting\glean\pending_pings\b3331aa7-9761-41c6-a226-b16a45165753
Filesize27KB
MD559b46907610867e8cd072976cb1da8a9
SHA1102590020c3499be2bcea4ba96b04204a1219023
SHA2569a3f466e4846b3cea2fcda60891c1c031c702c467f64773bf42e81d9079393c1
SHA5127bbdc64c4a5720449b26f14363c05bd4bd0075d7f0df36340f77538d783021cf045b2d4899b38a4af2ed847f6a7b868de2bbc406ef0ba59a58d5651cdce8a23b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\datareporting\glean\pending_pings\c334bb31-29ee-44b0-b842-be8b5dfb8afd
Filesize671B
MD5ea2c677ca0a147a3cd45242cd472ee30
SHA1401f1be0ea2567d4897b72977eafba9d26cf7d8d
SHA256c9061c7c91c2124491b0bea2eaa29ae5f4714a91a83e08710b8efe3fb806b496
SHA5124bee9dfd5746a1ef8ced8921f59cfa7caa11264202e4f79ee78edd9655d56326b1d6cb37227b514fa82b695336b47bcb2c61494246c66e15ff1ff5208a8a8ad5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5d4277f7e297ec222ef85290a1986e1e9
SHA12c6ded8ed7fc598bcaf16106cfa8e7d840b2e5ed
SHA2563dbb84245404637de6afe3e360784f64da2b4ef3184a199f798f3cb4635fd66f
SHA512177284c32a247bd8b77a7c6b51a6c1b104739cbde1089a60709e0f9bed44b7db865194cda88d4362f9d1bfd1a4ac556a4a954370be6afd6a97531d5691855e3e
-
Filesize
13KB
MD58f0df665f8f4b0d6b8c868702ff989dd
SHA14c211d26b494dff7016d71796d59cbd538ae2f74
SHA25620eb3a1fbc28d50f362e0d4a4af96875930288b944817bf7d4491352ce7c40dd
SHA512de7ee886c0f1ea68cb8adee6a23297046ffb6bd78739b28c02ec7bb62cbf5408086a566ce8bd62c7537dc653dacbf54a1a7135df6fc57307ce20e2837a07438d
-
Filesize
8KB
MD5ad143c0f386692e1be0cfe385fc9cfba
SHA1e5fa1ec4b48fad2aec7d603026987b6f27b00f39
SHA256960f738f2ff227fc4fe55d93fe5d4e917ee26ceab93f0443d83f39eb79c7786f
SHA5122f159c63517eb48e1e78f142f8d2370d6ae6ddbf7c5861154f9dca351c552512dc6ecc3e28c0bc77ec0387eb4f783eb6f5946fd0f41fa2ffabf1bbd4ac56b6bc
-
Filesize
11KB
MD53ae3679a592bde02819499df087a12f3
SHA1c7353adf2220dd7d16e874ee13beb831c1327623
SHA2560dd21593e16b10e5fe2aea6bf88061d33ed26ab85b13db040e9eb43467343cbf
SHA512518d58dbe1f3f24ef78e7690e09fabd7bec1013f57c9db581b54f5c97706ca311b7ab562cab5b4bd40cd8a5c0e4ca619a44db1b222443e06c320b86cd2b1c665
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\sessionCheckpoints.json
Filesize259B
MD5700fe59d2eb10b8cd28525fcc46bc0cc
SHA1339badf0e1eba5332bff317d7cf8a41d5860390d
SHA2564f5d849bdf4a5eeeb5da8836589e064e31c8e94129d4e55b1c69a6f98fb9f9ea
SHA5123fa1b3fd4277d5900140e013b1035cb4c72065afcc6b6a8595b43101cfe7d09e75554a877e4a01bb80b0d7a58cdcfe553c4a9ef308c5695c5e77cb0ea99bada4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD595002117d3875a0492946393713bc1cd
SHA1acca5a1760b28bb32592d20fcc6d1e9e26c5e03c
SHA25689e3559f82d2fe84a4ecd146562967af24e9ad8fe84b29b647164a5f3dcf80d4
SHA512cce026ad7615a2eb976f0eb13a63a0453a288b4f4b046e9284b95344868ffaca431a059c69306e44e322841b6989eb23090fe9e56f4db77de22542ae2167be91
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\sessionstore-backups\recovery.baklz4
Filesize9KB
MD536456abcbf1127e9003e93d105173b31
SHA1bb02279908036bd9d4deedb8bc571776317fe18d
SHA256cf504fb80ed2b659b36f9639f1e4472c86aea0539a8f19f4bb2a34fe90915ed5
SHA512cb5427f0ad6b8bffce0184a38692a50c4572f45bc178671e6243ed075b55a2409f236dd9662fd336808a2f425dea5cfcda4202aeeeb8eb8f723b7ca9c7b7432e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5fcadd194bf641a4a4c4f1e717fdb183c
SHA1ccc4928365280766d61513840c3f17e5f7700d3c
SHA2565dbb2ae888ee19512ef77dc96a28adeb2988656fa7e7c861159f7e02cb39bcb8
SHA512cbbc6868de4f9b02e2833b363546e33a89646c278f05cc6f7feec8c1ad80ee5a83d5822870ade322d7f7677f0f2bb9b9e12ee4da2aa56cb0907582e76c880906
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\sessionstore-backups\recovery.baklz4
Filesize10KB
MD5fd9d638b8adbfdbb6c7e812f549c1d80
SHA1234984b8be44fc388be108b4f544109a3e465e0c
SHA256a76dba226e02ae6ad0e628fab87471944eba9cf25905b9e76e2e004379c51c50
SHA512b2dad04e7dca624826e225b7ace8b64df65ecb716515277b4c37ec700731f78635ed0b2452c96d94fe1f1d7d9dae398c34287d36cc9ec24a4707cb0e146ba0e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD59ec39f36285df0f5586d2d30e1367fae
SHA14ff2a892019031f1ca8fb67bd7248a1fd88c932c
SHA25682ea1368f45017bb5a8499bb7b404c13e2f1d02ebcbc510aec913ef0df148479
SHA51230436683b0207611ba328049195e97d6fe0a3ec562304e015b324cd291f467338abe33308b3b3a62ca8f0e585f403a7efebf51fabaf834d851d93a80f0c36525
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\sessionstore-backups\recovery.baklz4
Filesize10KB
MD53e842a55d9a273e32beb89566284a5d0
SHA1200b2e5e58ebc866f11dc9fd3b74cf3e104444f4
SHA256a7d439293e689ee32adf431e58bbbe68d7bc2f6641075b11107eab1a42aa49d8
SHA51276d5abf360861881233b9ba9eb3a87c059cb5c744acfff480f6f478ee23b6c5d99d5fd280781aa3aaa7a45557be8bf0e68a2cdda4cf214840fa0944a1b5b2666
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5ff3d3d7163398f33e72eb63a6b448d5f
SHA16461d134df00c0afe8700be26ad936d39b32b72f
SHA2563999f08a16a333d64a9eae16686054cf1b42867d17191173191e3632ef750974
SHA5128aaa7eeef7bd2951e4ca525737bcd6c26674602be584d02f684b2dc732e70f14b8485924fb1a82425aa3deb567680e4747deb0e9d4bd3841c053345370b7ea1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\sessionstore-backups\recovery.baklz4
Filesize10KB
MD5e272e254fed277f39c3c55e14637f4bc
SHA170f042d7b54d7d6b8f1dd57a866d49288721b0ea
SHA2568b611b56593ac0e59555b28696d86b7b5ee70a7fb44bb2caac6eb383abb4a706
SHA5123ffae57e52d436c22140497138ee78b5783f77e0b5192ab9d8e1d908d96ca23716191058a45ae7843f5c6c488843201f0b85950facf05618b93f78cebb49bd83
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t4hat1k8.default-release\storage\default\https+++www.roblox.com\idb\3140325527hBbDa.sqlite
Filesize48KB
MD599595018bba9db7e568cf5f39ad12fce
SHA1871e64a87af01d9ef0a16de78cb14f35e6d40fe5
SHA256a2193b2faa0a07f20ad49f9f342e6330a6afd4a93c5081bbb3ca4219d7bc2c2a
SHA512e760c57c344462c8aa743781ea50fd4da58b8f4631c0529091eff1e0390f8cba9909d57ceac9832109059f6521c29e9bdba11cb9f49ab025925d05e89870126a
-
Filesize
15.2MB
MD5da60f4a09f19ac676aab608b5cf53ae2
SHA14ff7f0006f3f2b5b3feb6f9cc8e34243b35a1aae
SHA256cee06facb889ef2e8ef7ec07f1f1af57975e02cb474a1345f0dba0169c6e79f3
SHA5127945711f641977f59b7cbf8522408253cdc8d284ce27c6f221ba11d26405843d98abb31bef7be88d37dc2a2d6ab00e874d8474a6d0779612cf3556b9a18b8587
-
Filesize
280B
MD5505a5d445fa15e8c413f38caf27fb897
SHA1b2cd530b70617ff722646beae33956def1f10f65
SHA25648c719cef607ce5b003578e1efa134bf6b0c3a61c5222245743f3f9aaac2b816
SHA5126047ad9c253079b44d51e0ece07e98b3ab8711a878e6f619e3b8385e6c041f73d51b544915bd028c7c2f051b95c61edc88f60e3a898244efdb8b3e96f4991d6c
-
Filesize
66B
MD57ce55ac0d7683657fd051e573ad06e30
SHA13bc51fbc6155c4e9d1439587e1c739995054cc52
SHA256138e2b36e4c8bec8b00180558843355037d7de99c389f46e6183c4fc5a34c790
SHA512f269c5c2ee53ed836bfd1b928b40e1ddb2aaea00e5585c85fecfcb1add71130d4ecfe91d2f2527934ac472c8b432d3475ca02b8f808e7e6014cd49155529d9a2
-
Filesize
43B
MD555cf847309615667a4165f3796268958
SHA1097d7d123cb0658c6de187e42c653ad7d5bbf527
SHA25654f5c87c918f69861d93ed21544aac7d38645d10a890fc5b903730eb16d9a877
SHA51253c71b860711561015c09c5000804f3713651ba2db57ccf434aebee07c56e5a162bdf317ce8de55926e34899812b42c994c3ce50870487bfa1803033db9452b7