Resubmissions
11-08-2024 17:41
240811-v9en9sthpe 1011-08-2024 17:38
240811-v7raaazcqq 1028-07-2024 15:36
240728-s154ravdqg 1023-07-2024 17:57
240723-wjy6navcle 1023-07-2024 12:45
240723-py1vgazgkq 10Analysis
-
max time kernel
1029s -
max time network
1029s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-07-2024 12:45
Behavioral task
behavioral1
Sample
X.exe
Resource
win10-20240404-en
General
-
Target
X.exe
-
Size
63KB
-
MD5
f16a3a537f873f3e7bd334d6cf93c525
-
SHA1
4fbedba1adbeda56019534b1bf74ff47ed814e61
-
SHA256
ba599c53479ad87732d7d5dab8a4cca44bb55cbc134e6054ddb6414e9cfd1508
-
SHA512
032ec3782acaa2d21b24b8aae659e2bede424e594fee00aafbcf66840a8fd048fceae7ef2a8ad449a38590041d241c7edd1c219e9b5ffb3b5e8993a01ba4011a
-
SSDEEP
1536:zDJ1KwwGadRqckbTz0hdOWwdx6mf6ZOTLGuJi:p14GURjkbTnWvOTJJi
Malware Config
Extracted
xworm
127.0.0.1:7787
92.43.187.26:7787
-
Install_directory
%Temp%
-
install_file
St.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1424-705-0x00000000000E0000-0x00000000000EE000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/1424-1-0x0000000000200000-0x0000000000216000-memory.dmp family_xworm behavioral1/files/0x000d00000001ab22-194.dat family_xworm -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3816 powershell.exe 256 powershell.exe 1336 powershell.exe 2316 powershell.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 6116 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000900000001aba5-785.dat acprotect behavioral1/files/0x0003000000019579-780.dat acprotect behavioral1/files/0x0003000000019578-775.dat acprotect behavioral1/files/0x000c000000018f5c-770.dat acprotect behavioral1/files/0x000d000000018f58-765.dat acprotect -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\St.lnk X.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\St.lnk X.exe -
Executes dropped EXE 20 IoCs
pid Process 2968 St.exe 5192 St.exe 6068 St.exe 2740 St.exe 5096 St.exe 1808 St.exe 912 St.exe 3440 St.exe 5816 St.exe 2172 St.exe 704 rpuojl.exe 6064 rpuojl.tmp 4524 St.exe 1336 St.exe 3544 All-In-One.exe 1624 St.exe 5072 St.exe 5736 St.exe 4148 St.exe 6828 St.exe -
Loads dropped DLL 6 IoCs
pid Process 4212 MsiExec.exe 3672 MsiExec.exe 3672 MsiExec.exe 4212 MsiExec.exe 1424 X.exe 3544 All-In-One.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000900000001aba5-785.dat upx behavioral1/files/0x0003000000019579-780.dat upx behavioral1/files/0x0003000000019578-775.dat upx behavioral1/files/0x000c000000018f5c-770.dat upx behavioral1/files/0x000d000000018f58-765.dat upx -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts All-In-One.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\St = "C:\\Users\\Admin\\AppData\\Local\\Temp\\St.exe" X.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini fsquirt.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: MsiExec.exe File opened (read-only) \??\Z: MsiExec.exe File opened (read-only) \??\Z: MsiExec.exe File opened (read-only) \??\T: MsiExec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: MsiExec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: MsiExec.exe File opened (read-only) \??\K: MsiExec.exe File opened (read-only) \??\B: MsiExec.exe File opened (read-only) \??\O: MsiExec.exe File opened (read-only) \??\R: MsiExec.exe File opened (read-only) \??\X: MsiExec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\B: MsiExec.exe File opened (read-only) \??\I: MsiExec.exe File opened (read-only) \??\Q: MsiExec.exe File opened (read-only) \??\W: MsiExec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\L: MsiExec.exe File opened (read-only) \??\Q: MsiExec.exe File opened (read-only) \??\A: MsiExec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: MsiExec.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: MsiExec.exe File opened (read-only) \??\M: MsiExec.exe File opened (read-only) \??\N: MsiExec.exe File opened (read-only) \??\P: MsiExec.exe File opened (read-only) \??\W: MsiExec.exe File opened (read-only) \??\Y: MsiExec.exe File opened (read-only) \??\H: MsiExec.exe File opened (read-only) \??\O: MsiExec.exe File opened (read-only) \??\M: MsiExec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: MsiExec.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\K: MsiExec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\J: MsiExec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: MsiExec.exe File opened (read-only) \??\T: MsiExec.exe File opened (read-only) \??\E: MsiExec.exe File opened (read-only) \??\P: MsiExec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: MsiExec.exe File opened (read-only) \??\R: MsiExec.exe File opened (read-only) \??\G: MsiExec.exe File opened (read-only) \??\X: MsiExec.exe File opened (read-only) \??\S: MsiExec.exe File opened (read-only) \??\L: MsiExec.exe File opened (read-only) \??\S: MsiExec.exe File opened (read-only) \??\U: MsiExec.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 78 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" X.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri SearchUI.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri taskmgr.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\2717123927\1590785016.pri explorer.exe File created C:\Windows\rescache\_merged\4032412167\4002656488.pri explorer.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri explorer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 29 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MsiExec.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MsiExec.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MsiExec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MsiExec.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion X.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 4724 taskkill.exe -
Modifies Control Panel 64 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\Blind Access X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\TimeOut X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Desktop\WindowMetrics X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Bluetooth X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Infrared X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Sound X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Appearance\Schemes X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000071 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000104 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000200 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\PowerCfg\PowerPolicies\2 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\ShowSounds X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Bluetooth\FileSquirtInstalled X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000070 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000203 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\Keyboard Response X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000011 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\Geo X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\On X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\PowerCfg\PowerPolicies\3 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\PowerCfg X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\StickyKeys X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\ToggleKeys X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000012 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\PowerCfg\PowerPolicies\4 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Quick Actions\Pinned X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\User Profile\en-US X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Personalization\Desktop Slideshow X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Cursors X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000010 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\🌎🌏 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Quick Actions X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Appearance X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\User Profile X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Personalization X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\PowerCfg\GlobalPowerPolicy X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\PowerCfg\PowerPolicies\1 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\PowerCfg\PowerPolicies\5 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\MouseKeys X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\User Profile System Backup\en-US X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\International\User Profile System Backup X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Infrared\File Transfer X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\PowerCfg\PowerPolicies X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\HighContrast X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Appearance\New Schemes X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Colors X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Infrared\IrTranP X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\SlateLaunch X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000202 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Keyboard X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Mouse X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\PowerCfg\PowerPolicies\0 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\AudioDescription X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\SoundSentry X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Infrared\Global X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000072 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Input Method\Hot Keys\00000201 X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Accessibility\Keyboard Preference X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Desktop\Colors X.exe Key deleted \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Desktop\LanguageConfiguration X.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\International\AcceptLanguage = "en-US,en;q=0.5" explorer.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\Explorer\Navigating X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\PanelSound X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\Notification.Looping.Call9 X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\WindowsUAC X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\.Default\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\MailBeep X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Minimize\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Call4\.Current X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Mail\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\Notification.Looping.Call4 X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\Notification.Looping.Call X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\FaxBeep\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Call10\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\HubOffSound X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\DeviceConnect X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Alarm5\.Current X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Call9\.Current X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Proximity X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\sapisvr\DisNumbersSound\.default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\sapisvr\MisrecoSound\.default X.exe Key deleted \REGISTRY\USER\S-1-5-19\Control Panel\International\User Profile\en-US X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\ChangeTheme\.Current X.exe Key deleted \REGISTRY\USER\S-1-5-19\Control Panel\Quick Actions X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\Notification.Looping.Alarm4 X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Maximize X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Call4 X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\SystemNotification\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\Explorer\SecurityBand\.default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\HubOnSound X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\CCSelect X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\ChangeTheme X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\RestoreUp\.Current X.exe Key deleted \REGISTRY\USER\S-1-5-19\Environment X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\AppGPFault X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\Notification.Looping.Call7 X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\SystemExclamation X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Alarm7\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Call5\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\PrintComplete X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\WindowsUnlock\.Current X.exe Key deleted \REGISTRY\USER\S-1-5-19\EUDC\932 X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\DisNumbersSound X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.IM X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Call8 X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\MailBeep X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\AppGPFault\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Alarm4 X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\RestoreUp X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\SystemExclamation X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\Explorer\BlockedPopup X.exe Key deleted \REGISTRY\USER\S-1-5-19\Control Panel\Accessibility\Blind Access X.exe Key deleted \REGISTRY\USER\S-1-5-19\Control Panel\Accessibility\HighContrast X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\Notification.Looping.Alarm2 X.exe Key deleted \REGISTRY\USER\S-1-5-19\Control Panel\PowerCfg\PowerPolicies\4 X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\MailBeep\.Current X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Alarm4\.Current X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Looping.Call6 X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\Notification.Mail X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\ChangeTheme\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\EventLabels\SecurityBand X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\DeviceFail\.Current X.exe Key deleted \REGISTRY\USER\S-1-5-19\AppEvents\Schemes\Apps\.Default\SystemQuestion\.Default X.exe Key deleted \REGISTRY\USER\S-1-5-19\EUDC\950 X.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\www.bing.com\ = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\www.bing.com MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Sort = 0000000000000000000000000000000002000000f4eec83032a8e241ab32e3c3ca28fd29030000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "4" explorer.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d3436a6b00ddda01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\EdpDomStorage\www.bing.com MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupView = "4294967295" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 000000000200000001000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\bing.com\Total = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133567065551368052" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f80cb859f6720028040b29b5540cc05aab60000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\Total\ = "690" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:PID = "2" explorer.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4148 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4584 explorer.exe 4556 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3816 powershell.exe 3816 powershell.exe 3816 powershell.exe 256 powershell.exe 256 powershell.exe 256 powershell.exe 1336 powershell.exe 1336 powershell.exe 1336 powershell.exe 2316 powershell.exe 2316 powershell.exe 2316 powershell.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 4584 explorer.exe 4872 taskmgr.exe 4556 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3900 MicrosoftEdgeCP.exe 3900 MicrosoftEdgeCP.exe 3900 MicrosoftEdgeCP.exe 3900 MicrosoftEdgeCP.exe 3900 MicrosoftEdgeCP.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1424 X.exe Token: SeDebugPrivilege 3816 powershell.exe Token: SeIncreaseQuotaPrivilege 3816 powershell.exe Token: SeSecurityPrivilege 3816 powershell.exe Token: SeTakeOwnershipPrivilege 3816 powershell.exe Token: SeLoadDriverPrivilege 3816 powershell.exe Token: SeSystemProfilePrivilege 3816 powershell.exe Token: SeSystemtimePrivilege 3816 powershell.exe Token: SeProfSingleProcessPrivilege 3816 powershell.exe Token: SeIncBasePriorityPrivilege 3816 powershell.exe Token: SeCreatePagefilePrivilege 3816 powershell.exe Token: SeBackupPrivilege 3816 powershell.exe Token: SeRestorePrivilege 3816 powershell.exe Token: SeShutdownPrivilege 3816 powershell.exe Token: SeDebugPrivilege 3816 powershell.exe Token: SeSystemEnvironmentPrivilege 3816 powershell.exe Token: SeRemoteShutdownPrivilege 3816 powershell.exe Token: SeUndockPrivilege 3816 powershell.exe Token: SeManageVolumePrivilege 3816 powershell.exe Token: 33 3816 powershell.exe Token: 34 3816 powershell.exe Token: 35 3816 powershell.exe Token: 36 3816 powershell.exe Token: SeDebugPrivilege 256 powershell.exe Token: SeIncreaseQuotaPrivilege 256 powershell.exe Token: SeSecurityPrivilege 256 powershell.exe Token: SeTakeOwnershipPrivilege 256 powershell.exe Token: SeLoadDriverPrivilege 256 powershell.exe Token: SeSystemProfilePrivilege 256 powershell.exe Token: SeSystemtimePrivilege 256 powershell.exe Token: SeProfSingleProcessPrivilege 256 powershell.exe Token: SeIncBasePriorityPrivilege 256 powershell.exe Token: SeCreatePagefilePrivilege 256 powershell.exe Token: SeBackupPrivilege 256 powershell.exe Token: SeRestorePrivilege 256 powershell.exe Token: SeShutdownPrivilege 256 powershell.exe Token: SeDebugPrivilege 256 powershell.exe Token: SeSystemEnvironmentPrivilege 256 powershell.exe Token: SeRemoteShutdownPrivilege 256 powershell.exe Token: SeUndockPrivilege 256 powershell.exe Token: SeManageVolumePrivilege 256 powershell.exe Token: 33 256 powershell.exe Token: 34 256 powershell.exe Token: 35 256 powershell.exe Token: 36 256 powershell.exe Token: SeDebugPrivilege 1336 powershell.exe Token: SeIncreaseQuotaPrivilege 1336 powershell.exe Token: SeSecurityPrivilege 1336 powershell.exe Token: SeTakeOwnershipPrivilege 1336 powershell.exe Token: SeLoadDriverPrivilege 1336 powershell.exe Token: SeSystemProfilePrivilege 1336 powershell.exe Token: SeSystemtimePrivilege 1336 powershell.exe Token: SeProfSingleProcessPrivilege 1336 powershell.exe Token: SeIncBasePriorityPrivilege 1336 powershell.exe Token: SeCreatePagefilePrivilege 1336 powershell.exe Token: SeBackupPrivilege 1336 powershell.exe Token: SeRestorePrivilege 1336 powershell.exe Token: SeShutdownPrivilege 1336 powershell.exe Token: SeDebugPrivilege 1336 powershell.exe Token: SeSystemEnvironmentPrivilege 1336 powershell.exe Token: SeRemoteShutdownPrivilege 1336 powershell.exe Token: SeUndockPrivilege 1336 powershell.exe Token: SeManageVolumePrivilege 1336 powershell.exe Token: 33 1336 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe 4872 taskmgr.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 4584 explorer.exe 4584 explorer.exe 3544 All-In-One.exe 3544 All-In-One.exe 2236 SearchUI.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 4556 explorer.exe 6072 MicrosoftEdge.exe 3900 MicrosoftEdgeCP.exe 5456 MicrosoftEdgeCP.exe 3900 MicrosoftEdgeCP.exe 508 MicrosoftEdgeCP.exe 3868 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 3816 1424 X.exe 74 PID 1424 wrote to memory of 3816 1424 X.exe 74 PID 1424 wrote to memory of 256 1424 X.exe 77 PID 1424 wrote to memory of 256 1424 X.exe 77 PID 1424 wrote to memory of 1336 1424 X.exe 79 PID 1424 wrote to memory of 1336 1424 X.exe 79 PID 1424 wrote to memory of 2316 1424 X.exe 81 PID 1424 wrote to memory of 2316 1424 X.exe 81 PID 1424 wrote to memory of 4148 1424 X.exe 83 PID 1424 wrote to memory of 4148 1424 X.exe 83 PID 1424 wrote to memory of 4336 1424 X.exe 88 PID 1424 wrote to memory of 4336 1424 X.exe 88 PID 4336 wrote to memory of 2336 4336 powershell.exe 91 PID 4336 wrote to memory of 2336 4336 powershell.exe 91 PID 1424 wrote to memory of 4600 1424 X.exe 94 PID 1424 wrote to memory of 4600 1424 X.exe 94 PID 4600 wrote to memory of 2884 4600 chrome.exe 95 PID 4600 wrote to memory of 2884 4600 chrome.exe 95 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 3936 4600 chrome.exe 96 PID 4600 wrote to memory of 948 4600 chrome.exe 97 PID 4600 wrote to memory of 948 4600 chrome.exe 97 PID 4600 wrote to memory of 2020 4600 chrome.exe 98 PID 4600 wrote to memory of 2020 4600 chrome.exe 98 PID 4600 wrote to memory of 2020 4600 chrome.exe 98 PID 4600 wrote to memory of 2020 4600 chrome.exe 98 PID 4600 wrote to memory of 2020 4600 chrome.exe 98 PID 4600 wrote to memory of 2020 4600 chrome.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\X.exe"C:\Users\Admin\AppData\Local\Temp\X.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\X.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\St.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'St.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "St" /tr "C:\Users\Admin\AppData\Local\Temp\St.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c explorer shell:::{3080F90E-D7AD-11D9-BD98-0000947B0257}2⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" shell::: -encodedCommand MwAwADgAMABGADkAMABFAC0ARAA3AEEARAAtADEAMQBEADkALQBCAEQAOQA4AC0AMAAwADAAMAA5ADQANwBCADAAMgA1ADcA -inputFormat xml -outputFormat text3⤵PID:2336
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --mute-audio --disable-audio --disable-3d-apis --disable-gpu --disable-d3d11 "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ff8c49b9758,0x7ff8c49b9768,0x7ff8c49b97783⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1612 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:23⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --mojo-platform-channel-handle=1732 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:83⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --mojo-platform-channel-handle=1824 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:83⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --display-capture-permissions-policy-allowed --first-renderer-process --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:13⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:13⤵PID:164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3800 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:13⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --mojo-platform-channel-handle=4784 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:83⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --mojo-platform-channel-handle=4904 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:83⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --mojo-platform-channel-handle=4940 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:83⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4560 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:13⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3984 --field-trial-handle=1988,i,2183944391970623976,6611169500518230388,131072 /prefetch:13⤵PID:4456
-
-
-
C:\Windows\SYSTEM32\MsiExec.exeMsiExec.exe /I{64A3A4F4-B792-11D6-A78A-00B0D0180381}2⤵
- Enumerates connected drives
- Checks processor information in registry
PID:5020
-
-
C:\Windows\SYSTEM32\MsiExec.exeMsiExec.exe /I{64A3A4F4-B792-11D6-A78A-00B0D0180381}2⤵
- Enumerates connected drives
- Checks processor information in registry
PID:3540
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall set allprofiles state off2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:6116
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\il2ia52p\il2ia52p.cmdline"2⤵PID:1508
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFF39.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2272BBF7DEE44CF1AC996576C374D758.TMP"3⤵PID:5344
-
-
-
C:\Users\Admin\AppData\Local\Temp\rpuojl.exe"C:\Users\Admin\AppData\Local\Temp\rpuojl.exe"2⤵
- Executes dropped EXE
PID:704 -
C:\Users\Admin\AppData\Local\Temp\is-SU77T.tmp\rpuojl.tmp"C:\Users\Admin\AppData\Local\Temp\is-SU77T.tmp\rpuojl.tmp" /SL5="$8026A,1848191,161792,C:\Users\Admin\AppData\Local\Temp\rpuojl.exe"3⤵
- Executes dropped EXE
PID:6064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Cd %temp% && All-In-One.exe OutPut.json2⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\All-In-One.exeAll-In-One.exe OutPut.json3⤵
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Suspicious use of SetWindowsHookEx
PID:3544
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM explorer.exe2⤵
- Kills process with taskkill
PID:4724
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4556 -
C:\Windows\System32\fsquirt.exe"C:\Windows\System32\fsquirt.exe" -Register3⤵
- Drops desktop.ini file(s)
PID:3080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:3716
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3868 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3868.0.854871426\1626394262" -parentBuildID 20221007134813 -prefsHandle 1748 -prefMapHandle 1740 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {133ca26d-c8f3-4758-9685-cc22d7b3b7d6} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" 1828 1fa2c5f9458 gpu5⤵PID:4400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3868.1.129685864\1995313430" -parentBuildID 20221007134813 -prefsHandle 2172 -prefMapHandle 2168 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5dc94a02-6e03-44d7-ae98-41b5f9d4ab1e} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" 2184 1fa21572858 socket5⤵
- Checks processor information in registry
PID:3676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3868.2.1867473384\82741686" -childID 1 -isForBrowser -prefsHandle 2908 -prefMapHandle 2716 -prefsLen 20931 -prefMapSize 233444 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7fc48c4-f4e9-40f7-9175-e1904a634e50} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" 2728 1fa2c55e458 tab5⤵PID:5644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3868.3.1434362396\2128268568" -childID 2 -isForBrowser -prefsHandle 3432 -prefMapHandle 3428 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d78ad1f1-2a4e-4b19-9cd2-adcf544d9b33} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" 3448 1fa31605058 tab5⤵PID:4008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3868.4.1511221677\284525651" -childID 3 -isForBrowser -prefsHandle 4224 -prefMapHandle 4220 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79a861e2-72e0-4ef9-b9bc-a8c7fe53b224} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" 4248 1fa325d1958 tab5⤵PID:3708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3868.5.684513553\515386843" -childID 4 -isForBrowser -prefsHandle 4760 -prefMapHandle 4756 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2898c776-95f8-4e61-a087-fb758773601c} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" 4744 1fa30ddc458 tab5⤵PID:3552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3868.6.1503981897\1095432701" -childID 5 -isForBrowser -prefsHandle 4824 -prefMapHandle 4828 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2669a3dd-482b-47f6-ae1a-71ca90992d5d} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" 4908 1fa32e1cc58 tab5⤵PID:3880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3868.7.602788434\2025800455" -childID 6 -isForBrowser -prefsHandle 5052 -prefMapHandle 5056 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c16fbb0-2196-4c4d-9afc-6ef63a751a27} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" 4724 1fa333d0358 tab5⤵PID:5012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3868.8.456499091\1963057900" -childID 7 -isForBrowser -prefsHandle 5540 -prefMapHandle 5536 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1284 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {07bd22ac-900b-4be9-b1d5-6fef8f29a988} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" 5624 1fa30880858 tab5⤵PID:6720
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4872
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:2968
-
C:\Windows\system32\ctfmon.exectfmon.exe1⤵PID:2532
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4584
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵PID:2456
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:5192
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:6068
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:2740
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
PID:6008 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 77429A50F0DBDB2929D7E15ABC763C93 C2⤵
- Loads dropped DLL
PID:4212
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding DBE2C2B20AC050331353144DAE55F592 C2⤵
- Loads dropped DLL
PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:5096
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:1808
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4141⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:912
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:3440
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:5816
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:2172
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:4524
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:1336
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:1624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -s CryptSvc1⤵PID:5940
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:2236
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:5072
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:5736
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:4148
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6072
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4588
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3900
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5456
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:5544
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:508
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1388
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5908
-
C:\Users\Admin\AppData\Local\Temp\St.exeC:\Users\Admin\AppData\Local\Temp\St.exe1⤵
- Executes dropped EXE
PID:6828
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Scripting
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4Scripting
1Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD503c4f648043a88675a920425d824e1b3
SHA1b98ce64ab5f7a187d19deb8f24ca4ab5d9720a6d
SHA256f91dbb7c64b4582f529c968c480d2dce1c8727390482f31e4355a27bb3d9b450
SHA5122473f21cf8747ec981db18fb42726c767bbcca8dd89fd05ffd2d844206a6e86da672967462ac714e6fb43cc84ac35fffcec7ddc43a9357c1f8ed9d14105e9192
-
Filesize
40B
MD5419cb87eea0a14990a3be016793cb112
SHA12e35de87be431bd96dd5ccf4250b6b1f42e7413e
SHA25687af132c8cb0c13cd8bacafbd5e279f5325fe969977b91b5586a87d447aec484
SHA512af5d4e9887ee8b64b4cd5d098512699206c0484ded49c605ea14c15bb605713448bdafd5599ce6e253fd4af73b627169f48b86fc779d45cda4971d917a79694c
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\736e19e2-5df7-4167-a89c-c85e5ff7c8d1.tmp
Filesize12KB
MD566b7377b77abb367c71d9dec9b41e363
SHA1db70e29a59a55dd14312df2b6b1aa26e699eb9c9
SHA2568e716f7975834a6eee9386838e53812889e54001d6b8a9c3c5f4d92eeb08b69b
SHA51266bfd2c9da78ee2d29d1961890cc42c0f089b8818cbd106092f445104346393b7dfc42fc837be706bf6b2ab35cf241235b57822127cf3c34d149b23a688160a8
-
Filesize
32KB
MD569e3a8ecda716584cbd765e6a3ab429e
SHA1f0897f3fa98f6e4863b84f007092ab843a645803
SHA256e0c9f1494a417f356b611ec769b975a4552c4065b0bc2181954fcbb4b3dfa487
SHA512bb78069c17196da2ce8546046d2c9d9f3796f39b9868b749ecada89445da7a03c9b54a00fcf34a23eb0514c871e026ac368795d2891bbf37e1dc5046c29beaaa
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD51afab86399ef251fda5c5d6b24cef76e
SHA12d6ca165c795b4c56ce75427cbdad60ab5bdc439
SHA2567d35eaa7b60429e229ce17f189bb51eacc6eff58d2e641c91f3337dc4166e40a
SHA512a1d1abc25c83b3baf6c641ff9838972fb6707f92455c927ef6173078f3a133aa0b7a5d6055913e5cdbe1bae8e49e317d4ff4504f8a51f31ae4605ccedb20c4af
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5052f9b5e6b4f2caa25dba2b6f4bce51e
SHA1a613ec8fb8b5926f49d2a41583f7187d2531d1bf
SHA256e1d948330e6f67b794dee255e471bb56cc89be9281a5a9b1467bdfb2a8885674
SHA512ea7f99066d0015212413ba26bdc61201705864eecc259237e96a50c94a16efb8768bfcc4771d84056be624d05f9003a2cc43dc14cc6ba98dd02a04f6b4398f98
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5b3f212c0785c7e1d02f9c8e6ec6013fc
SHA14aee3b76a2f85141a75f7e1f681489c90802990f
SHA25612b828327b5874ac5d22835077c82f681d334c5d66c2ecce2a454956cb021e49
SHA5128d98548c42e5117376e660da796afd49f079cafa73ade5f79b375eb43e426ca7513052712705a55b270517b55088d7222dba050b24f62a32185bb225a33e98c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize48B
MD539afaa4fba25894cf4f35d393a013cd6
SHA1ed68c481b18820bf72214efb8144f860c31cab82
SHA2569fb5efd0b9919dd90cccfe29a21ba46b719076e3b1bbb18809b43c4fb66cadea
SHA5124c515b14c88b30afec5218ec25583aebc3505c3d1476bf6806d72f50e221fc87952ea39eb82c0256240010b8c5e0a878ac3307305511731c2a2a07c4b46246d8
-
Filesize
256KB
MD527828dafe8df6cf33413ecfcac9bdb4c
SHA11749f8de2943503482c447d72f8ce99ce36b2c22
SHA256627c024c1b915b4ee3bed2944b3cc3457725a547c4f957425e422a82e09cc8e1
SHA5128f7b4ac1ce90dd2eb5792d6ba9cb04c24507908e04f8d07b04967ae585c4848cc3b4a7bb2eabe39503b36aeb4fdca20ef7566fc3bcea1dd292b1f22680ec531a
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\computed_hashes.json
Filesize10KB
MD590f880064a42b29ccff51fe5425bf1a3
SHA16a3cae3996e9fff653a1ddf731ced32b2be2acbf
SHA256965203d541e442c107dbc6d5b395168123d0397559774beae4e5b9abc44ef268
SHA512d9cbfcd865356f19a57954f8fd952caf3d31b354112766c41892d1ef40bd2533682d4ec3f4da0e59a5397364f67a484b45091ba94e6c69ed18ab681403dfd3f3
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\verified_contents.json
Filesize7KB
MD50834821960cb5c6e9d477aef649cb2e4
SHA17d25f027d7cee9e94e9cbdee1f9220c8d20a1588
SHA25652a24fa2fb3bcb18d9d8571ae385c4a830ff98ce4c18384d40a84ea7f6ba7f69
SHA5129aeafc3ece295678242d81d71804e370900a6d4c6a618c5a81cacd869b84346feac92189e01718a7bb5c8226e9be88b063d2ece7cb0c84f17bb1af3c5b1a3fc4
-
Filesize
20KB
MD53eea0768ded221c9a6a17752a09c969b
SHA1d17d8086ed76ec503f06ddd0ac03d915aec5cdc7
SHA2566923fd51e36b8fe40d6d3dd132941c5a693b02f6ae4d4d22b32b5fedd0e7b512
SHA512fb5c51adf5a5095a81532e3634f48f5aedb56b7724221f1bf1ccb626cab40f87a3b07a66158179e460f1d0e14eeb48f0283b5df6471dd7a6297af6e8f3efb1f9
-
Filesize
256KB
MD5f7dabee1983c9fbb2a03fe7723a55d41
SHA144abf860e8a3376deba5258cdf135ca6c45ae23c
SHA2562464657a6d2ab20c016e69314eca6f8df3370ee2ff0ede12e749a8f5b364e170
SHA5122dd58ee7a845efb26e1dfa315a9e6b0782b8d0d5b7e05dbe2e317936df771e09affa0ce163045ebc1cc7601039acd246bef5550a29feced0fa15df22e143582f
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
1KB
MD5692da8da711368b620acec5eeaa63a96
SHA1dd3f872482cbc4281e0ede7f191b2d00873e4163
SHA2566abe43c7c1d02f96141e07dcd0a55fb98aa594a6021f550aac8fb8e8ace97c3d
SHA512c6f62bd4d9902a6cb3aba999cb1a8c12cef57989f4edabec9e8d73669b50d9cdcb28ba25a6d45f3a6450a7cbd6e53a91f6f8b59abb8b8778ac9c5477648b97c6
-
Filesize
1KB
MD595db3e266ed7cb70b2a41d559cadf886
SHA101f168d93f6aab806110485e92603d21cfce671c
SHA256ae6788bbab97b0a07cc67e4d76d4e8455440805463ab34aceae4d1fa34698ff1
SHA512f98bc3adb499f6d629dd43e9ea776fc58d93da94543c11a56cecf45da63da93265babb9a673493c7e4194bc5891af2000b943b4687fd410207a3bb4cad6eee6b
-
Filesize
1KB
MD57ae34d8cecf00c7342d85d45e0c31606
SHA1b53632cbefb36c7a2d2051f7b199f503f1d8b214
SHA2562e393240ec2f0a72003fa30526004027b5bddd893aae5738a9c3eac5157c1cdc
SHA51200d6b6e824f64857bf991aca2e4bfe459677c831af9f5fc0a6d7855285d3da58cc483765397b9c31ae30fce0e5b67d06f7bf73c20c5183f5b46a7047a61a6a33
-
Filesize
1KB
MD540bafa88473e35655ff6e6ee139c6e84
SHA1d825f1c69d4f01dac5ba2242040aebac23afe26d
SHA256b7e4f8613052306a441284169a47e5b2d075e19fa4ea2b5cabd04b435082918b
SHA51289da6a8126bee034e9546ec00c3bad531c1b55de4ea13c3e16a77d2ffa75582fb027d09d48ca476a13b6e1e9b3b2a35aa1689cec38e8542f04ffa97144466fe1
-
Filesize
371B
MD56f5b6dc459e0b5a2f15d811e3f3f4702
SHA130865fc18a882a042a99b1fac51f1f2e736896c5
SHA256f1606e2f051fa0fd4cc8eb8fcbb3cb9d55497f5bebd0a59b6ff877ca4cbb711c
SHA512d599b6e8a2ddc80d38e87990c0049706c2ee153ae4b67a7b7355ae6b00b7a93b668b7c97609d77af5ad3a313ccaab240d477e98251a749344f41604ee4f1f4fb
-
Filesize
371B
MD5c6476a2f1a46d5ecd416e4656eb29ddb
SHA1389a20ea5ef144cdb08559613f00dd25441bdecf
SHA2563b037f1c102c6c39d8d5ef137b55552a75a5b1019daeb4c89df0fa577d910a6c
SHA512a1b304290d7de3819b6947cfb64f55004b03a8143dd0b77b34e51415a080b7d2bbffb469531c2f9181c613de21454c29a2c97b8feedd61fd195c736dce533276
-
Filesize
5KB
MD53ae1121028794a49b37c23796a708be5
SHA1f60b7acc108d63c5c3f193e722bef22a15c5f913
SHA256c10c36d62b90f3e25af496bffb44083d2ac8a53611bd727495aec394051d640b
SHA5123e50f41a3043668d4b0d4bac2d840fdad469817386bb564af18e54cd8506043b816344f9d5c64e8802de10a83ff4eb3dd3509a6aef20ffbba6f8db4a9bbce837
-
Filesize
6KB
MD5804313734250e729d7725ecefca712b1
SHA1b11f9b3573ec444508deb7532b0f2a425ee0ba1c
SHA2561c61a9562447b428811b598b65d1042cd27e683ff5a73b7be176885b426f3d0a
SHA512b6d806431b1faf50f803c884e621b038d633b7342e8dbfccff592c9bbdb4516e203f516d1f228939658825e103d880103122e7246e9aba98d75039d2217ab1ec
-
Filesize
5KB
MD581634e8e14f39a2415e37489f0cd93ed
SHA12fc17bb6de2f1d9fa62ac6a2115c6a12e1114051
SHA25609bd64306aabd3488ab2d5c9dd7666cdd90ec04957611a6efc910e8ddcaf94c7
SHA51212e08ba49d35a020b3a24f55e04f34e178d3309e51ef9bcb3e55b48269361288521b6faf3427288abdedd193c547383562d89e2a1aee016b43cb92328e2021a2
-
Filesize
6KB
MD5af543e87b6dc065d4565c109151df15a
SHA108b3bc73c3dba3ce4b4c4fbe25a2b3d5b9013e1f
SHA256f3a37d2ce66c1e4601fe17808355453a73dc715882f76b8a9affe7eba12df37d
SHA5121bba71304b2545387fa28cb5d6d17a59c6115b464a1f4a64f8ec2c2cc61c90d573dc56c6b44b52ead2a7c64a3b9a1021c540a1ee12de65f1a119b72e124e0daf
-
Filesize
6KB
MD567c4e2589a0655df2212d00003cac8e1
SHA154144f964e69310216b99d547e93c033126b3450
SHA25641da0c105d761394f445ee64c23fe68424e297a702056a34e4ab3146eaf2dc3e
SHA51274d82ac7854842f11e47473a6c4f4a2e681c5df5d14f4493a3f203084de0965fc66146a90212058c86ad7c4f6bca79534050d5476b6b3dfba025530a4927d0f3
-
Filesize
12KB
MD54dc69714f7058b4c6cf2a927f97f678f
SHA1ce061b169c722ab6a8ea9fdd838d445a9eda5ddc
SHA256b314d42c5d121e099dc34c46e18c5ac51e7647e590f9df26f82500d3f671dfce
SHA5127d1955362e40ef5d3a110128557eab3beaf818200fc0473610d0958b7285c57e29d7bae390467027bf0f97161670f2bd03a70b005e5c6222c85c85d34022dff1
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\Site Characteristics Database\000003.log
Filesize40B
MD5148079685e25097536785f4536af014b
SHA1c5ff5b1b69487a9dd4d244d11bbafa91708c1a41
SHA256f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8
SHA512c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f
-
Filesize
348B
MD53c54b8a6d0a11fcc8735dfad54ed1d39
SHA18d014595984e3f0d3625d458d731bbde7ae4602c
SHA2562d5ee00985a5d91fa92972c4d88ea9c5e3ffc4a105507cd0fe39dfbce024d9af
SHA512cd79042f5229529e94d6bfc7ca6b8410a56935fcc4699e6f01678c18bc815bb1ebe22796a2f25e22d34c1e4fc920b8d0a5c2ac5ca48a53889e66f22cd777dfec
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\Site Characteristics Database\LOG.old
Filesize305B
MD5bd577f108e1f4a1deb7ad1e68adda6ae
SHA1c2a967db9ca4e6334f7f88e5d56cff10122f7085
SHA2561fd3a8434e1b6d0c98dd6df008df802105f3055a8fee8d460be423a1d5d0b652
SHA51235efda69fbafb91baa8cbcf6684390814112df935e38468d51e18e1d9797e2676f852db894ea379d47fcd1c016adcf07ca58e1ee687ab33640fddde58224385e
-
C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
6KB
MD5b66dd1bc40a0128725c8a8eff2a39e15
SHA125cb76d328419f3d02b38b1b8891e1ff7cc285d1
SHA2568333a9bedc457c0c218243f09c77b57e439da552b87c86e4bc05d85aaa02d6b9
SHA51258df2ccbc2101b22acf426eb7398dcac2e6f81d62ab3ba4280ff92b65bd15f6aea1bd503ba18e99c2b11ee7dd36e3b1a446c1ad07516bbc428bf8bfc64bb7566
-
Filesize
321B
MD59f2fa6ccad956781e4202a8fb0dd5b58
SHA1e722293c5c68e0eeb8c01785a6f53eaa74e5f1d5
SHA25647377c10f38e5ca77ceabe8ec1b12e5c47f928087f2c6aff67c8eea24b69afe3
SHA51257c78482d36bf0b3e952faad0bd450c6d5df83a0685f56eb83645f43d373ff8e5eca4a9d8fb13ca99e889f53d2857ead5ee6f5e33817d2720857f4fd6c7dd7bb
-
Filesize
283B
MD51673b56461a61eb3855eefb711bf2a20
SHA14765b2124d1d7d33e516157ca9096be2bc55f417
SHA256d3d63754fa035f4766eb2ba4baa6263246ab7c052339dd0c64d0242a2dbf2bc7
SHA51281bfae5a103a190f9f6f71446c75953795e04f7c53ac4e33282f3e767f318a5bc84698455855636280854ec622708ca40e8d8ce5f5f4bbeea9a23344ea913233
-
Filesize
20KB
MD5f827a28f6100a85bd8217d338ccca5a4
SHA12a180393edd7109c3ab03db4e6edf07ddd9672eb
SHA25682ee998a4908774d5f55d1d65c897abb5c36458bafada8dc945a09c6b9f21429
SHA51277fc5289c9d5f954e789f2c0b908a39e8e988201b0ff89efc1002d2d5d7808a8e60e9332be4b9838490d48e4a4385d8cd9b3b18c8716ceb9d6f2117cb2e53d60
-
Filesize
33B
MD5d3b16d20208eb96b845b59fb1149b79b
SHA144b62edb4a7e123d51d63104536bb3d8fdea3564
SHA25645653bb7c52cb19e2a73f0e6313af292f244f38003dbc1a0c9dc0a12cdc93aec
SHA5124717222e48042a80c656184cac5f3310eb23fa5b1efc243111941c4ed001bbf33ea39c0df0abc21c6be0f9d8b783864b7647b99e2f80a8a9ee364a2f0802acf5
-
Filesize
128KB
MD52a9cc94474280c74d11ac780dd8e24a8
SHA1c92533b1d2626389ffd22c7620705d35dbd2fc56
SHA256767bb158c6439205849585e315ec073543111dfc70f855327b495a7c68bede1c
SHA5128f9e242a6584882ee7ec391b874291c983e4e4e86f8803b67adbba7c360d413021fa78acfe2866d4758a92bf05d08e5e5090018476ef8f81b09b5e5b7066d02f
-
Filesize
92KB
MD5cae9079afcb4c379869afa5d34181d8a
SHA1188e2435c533dd9633f5fcc09f245ddc1a78db2c
SHA2562be0a96da90da69fbc34b8e7747e89ce57dfc4fb58ed6c79e0fc21cb7c6791b7
SHA512ff7d863ebd1090219f07eaf2ac493f20b6ed11606e7f2c19536d764e730a8bb426fff26dc3890f0503c12329ea4a6c5d8812a0d1b69c19a29fbb8cb8366bd4fd
-
Filesize
317B
MD5005668286b98d405bd5945f434e8657f
SHA178996c841ba8be46175d035eea86e54e0abe24f9
SHA2560b28e9f5eb76f23b91ec1be3df0a2bb1087b7b9e9731852a06fa45f7b4e220e5
SHA51208ee588fed19db57e2c07c6410c584df098f268797d5d105d8abc711874df918a0b94687989d786dda281687636c42bf7c0ead2e612141ed6350a6f34cbee675
-
Filesize
277B
MD53985f03aa8b5158457f98b0e834043e9
SHA13990e462ce103cc159d8276119f4912eff9f8d62
SHA2562909541202846eabab13cbc6caf73854f49f1b6937b0bb61bba7717a218f06a5
SHA512ff040a6e7180320164691cfb3701bfe948daea2c45552c319007f42e7fedbc6da0350cf6a32736c0a408c925669463f837473f18ded02e5590040dcea72e7c13
-
Filesize
884B
MD5a28185beb78e9f6d35fc00565436b87f
SHA1936ff738ae50a7bfd988f1a047fe5244273a8e69
SHA25676d1e85bcd29d6bb7ec046a8f46df9f62d58ee20d195f11764dd5d1567d9ec0a
SHA512481b970505a34677302c358d0b9d9bb1c7ec86588f13a6a216773b969fdffdcabab5e9c4c5a3a7b44d2451e7d3d13788047f8a59aa9eed6081e9d055bde3a47d
-
Filesize
335B
MD5d1f06279ab9f914d35049f43c9c169d8
SHA1a8236aeba734dd83d4e16203d29dd103316d0946
SHA256ffd5df84a3e6742686becf3c12d933077a2e356e4ce7bd71d9b28483f8c8f719
SHA512da2a9bdf96fef6fcb4d298d68d3a0dd419908b3a2fc7f61644328f5c3fc5fc7d8c40e51618530e66553ac293ca370dbdb3acce8b55644ef5e36d6d60516000b5
-
Filesize
295B
MD515faced36e792e3527a44ab1a4a2d8aa
SHA1832678ac4ff7b2127b4a7018184efe3e8123b7b8
SHA2560d6ceb016e3115a1872c9048dfb1eb14c1f1c4175a76fee84a0a918e2388bd7f
SHA512d0889aebd23a9e0cb73ce7eaacec14b2a322cd03775f9df27c3342e36a166713e306d77eb4e3184d6d6e47c4cb1ae9c8b576f256e14172cbb111db9a0eed8609
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
14B
MD59eae63c7a967fc314dd311d9f46a45b7
SHA1caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf
SHA2564288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d
SHA512bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8
-
Filesize
136KB
MD522583a6a8821bf2e475dbdf711b00d6e
SHA18d68cd5666074747d0b44c6104ed156461b27979
SHA25643eddb6de7b61c45fb80cb6c8a503df2a959bec3f1b50c404e7d7d8336933d83
SHA512dabcb52c42c8ec031e22559bae28542299ea64d75c1828aa13920354445cf776d696abd23eed3060a81c371ea136091573377c43ef75b18ba5a98ecc6189139b
-
Filesize
290KB
MD5df880eb0814a8f103911384859f91be6
SHA1b8fb8f77951a8bb27b31afb9e280fe6d7d4122ed
SHA2567e0f0cdb990f204e88c2e4e41020c41d2ff6b2f0ffdd0519df0c9033f0b09aa8
SHA512fc4f02ada481d8a8a8ccaf73679249618403c307c89f717e2eba09cd5b1ad4d331c8f671e42df2f15ff89ef5f05fcd9b1de9c22e89a88bc46be5916c990ff684
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
14KB
MD56cf54d45b721374fcc8af1c0e3925885
SHA1ca1b90971e2e751b034c9af78c129490707135b7
SHA2562519f67badd024323726b1f49ef9e8d8ca0f1c4eef98b358e72279c3c077b268
SHA512f996f89fc3cd58a4840132ade69697afecd10ea9e66fa4b0a28f5d9785733c629a2feaa21bf71ee9e8bdd36378843f244e2ac26ee0430645cc23c712fa277a02
-
Filesize
14KB
MD557c228223879e62b215b8ae3604f348a
SHA1bcec4ce65ef055a55fd270653871f2474ebc6a5c
SHA256d77074080413ee151c013f0c0dbdf90ddaa5996be887e21b57fe352ab87f8f63
SHA5122e39c06bf920a2a0316cb0713c5668e3dafa3330e6b40b423313fd89d90263587be5ea4eaafb9f943ceb922ac481d1094e6c8169a827b9fd885044815ec1b2cc
-
Filesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
Filesize
2KB
MD5b8da5aac926bbaec818b15f56bb5d7f6
SHA12b5bf97cd59e82c7ea96c31cf9998fbbf4884dc5
SHA2565be5216ae1d0aed64986299528f4d4fe629067d5f4097b8e4b9d1c6bcf4f3086
SHA512c39a28d58fb03f4f491bf9122a86a5cbe7677ec2856cf588f6263fa1f84f9ffc1e21b9bcaa60d290356f9018fb84375db532c8b678cf95cc0a2cc6ed8da89436
-
Filesize
1KB
MD5aef4cbe5cf7919a13df4b59fdf903044
SHA10bf7780069a9fe2e12e2d9a6c8a3dc958ee36b54
SHA2562a0c4466c488e3752166fee0d24ae4666b6e1c371457824c9402427d4cfe6fd1
SHA512356a4bd889c3593693836077fb93bead633d71442af78543334f88926db68e07208c5c45434be03b7f1636fca2135f02c5dc8747dd36c984053e2a607df13a38
-
Filesize
1KB
MD5e7418ea787e83a773db577a377e7c444
SHA1dd84dadd6bda9cb3af32ad922b6a46f0523a039b
SHA2568fca2208aaaf094dfe7ef69f1b4fcba96539ab369ddf38601d74ba0e2c67476d
SHA51249f54398342aa62a2707381873cf49380837d40038fdad21bc9f2a6764cabebcac4a93adb9a63188666033c30591f992d72179a65bad00507d3ecdc7f694a0e0
-
Filesize
1KB
MD57d922589db41d2aeca8290093e0315a2
SHA1b363745e1b843bb4294af665e7469dd8fa9cc89c
SHA256ca75f8320b621e9f6c8a6aea2efd067c2787dac5145ac6311bad5b45cb39bc26
SHA512a08a070420b969f9de915f14351c8741b58ad3dababf22eebe2d6e3e0b2d5d96bf97a6b767a386c8130c2ca3957b229ae5e2b610c2e1f004480aa0954fe6bbc1
-
Filesize
1KB
MD56df58765119d53ec3d2579df841e4926
SHA169d31b70476adfa0b07135cafcd2796b1043a7f7
SHA25607b43b472e0ecf9a01b985b6c66e42d34d811d28c7c47d2c93f55b59a21bf82d
SHA512960bcd541c5791daf30b340f90b9e0a9cc530814411f9c686855a996b29e6561552dd690120529f480ab364980148941f002085e02f65c2e83799a6e26f3c935
-
Filesize
5.1MB
MD5a48e3197ab0f64c4684f0828f742165c
SHA1f935c3d6f9601c795f2211e34b3778fad14442b4
SHA256baecc747370a4c396ef5403a3a2b286465d8fe4677bf1bfd23b8164ef5c22bbb
SHA512e0b0b73c39850a30aac89f84f721c79f863612f596d6ff3df0860a9faf743a81364656773c99708e9c0656c74b6a278b6bf7e648f7ff1b9080f9a21e10515a59
-
Filesize
18KB
MD56ea692f862bdeb446e649e4b2893e36f
SHA184fceae03d28ff1907048acee7eae7e45baaf2bd
SHA2569ca21763c528584bdb4efebe914faaf792c9d7360677c87e93bd7ba7bb4367f2
SHA5129661c135f50000e0018b3e5c119515cfe977b2f5f88b0f5715e29df10517b196c81694d074398c99a572a971ec843b3676d6a831714ab632645ed25959d5e3e7
-
Filesize
21KB
MD572e28c902cd947f9a3425b19ac5a64bd
SHA19b97f7a43d43cb0f1b87fc75fef7d9eeea11e6f7
SHA2563cc1377d495260c380e8d225e5ee889cbb2ed22e79862d4278cfa898e58e44d1
SHA51258ab6fedce2f8ee0970894273886cb20b10d92979b21cda97ae0c41d0676cc0cd90691c58b223bce5f338e0718d1716e6ce59a106901fe9706f85c3acf7855ff
-
Filesize
18KB
MD5ac290dad7cb4ca2d93516580452eda1c
SHA1fa949453557d0049d723f9615e4f390010520eda
SHA256c0d75d1887c32a1b1006b3cffc29df84a0d73c435cdcb404b6964be176a61382
SHA512b5e2b9f5a9dd8a482169c7fc05f018ad8fe6ae27cb6540e67679272698bfca24b2ca5a377fa61897f328b3deac10237cafbd73bc965bf9055765923aba9478f8
-
Filesize
19KB
MD5aec2268601470050e62cb8066dd41a59
SHA1363ed259905442c4e3b89901bfd8a43b96bf25e4
SHA2567633774effe7c0add6752ffe90104d633fc8262c87871d096c2fc07c20018ed2
SHA5120c14d160bfa3ac52c35ff2f2813b85f8212c5f3afbcfe71a60ccc2b9e61e51736f0bf37ca1f9975b28968790ea62ed5924fae4654182f67114bd20d8466c4b8f
-
Filesize
18KB
MD593d3da06bf894f4fa21007bee06b5e7d
SHA11e47230a7ebcfaf643087a1929a385e0d554ad15
SHA256f5cf623ba14b017af4aec6c15eee446c647ab6d2a5dee9d6975adc69994a113d
SHA51272bd6d46a464de74a8dac4c346c52d068116910587b1c7b97978df888925216958ce77be1ae049c3dccf5bf3fffb21bc41a0ac329622bc9bbc190df63abb25c6
-
Filesize
18KB
MD5a2f2258c32e3ba9abf9e9e38ef7da8c9
SHA1116846ca871114b7c54148ab2d968f364da6142f
SHA256565a2eec5449eeeed68b430f2e9b92507f979174f9c9a71d0c36d58b96051c33
SHA512e98cbc8d958e604effa614a3964b3d66b6fc646bdca9aa679ea5e4eb92ec0497b91485a40742f3471f4ff10de83122331699edc56a50f06ae86f21fad70953fe
-
Filesize
28KB
MD58b0ba750e7b15300482ce6c961a932f0
SHA171a2f5d76d23e48cef8f258eaad63e586cfc0e19
SHA256bece7bab83a5d0ec5c35f0841cbbf413e01ac878550fbdb34816ed55185dcfed
SHA512fb646cdcdb462a347ed843312418f037f3212b2481f3897a16c22446824149ee96eb4a4b47a903ca27b1f4d7a352605d4930df73092c380e3d4d77ce4e972c5a
-
Filesize
25KB
MD535fc66bd813d0f126883e695664e7b83
SHA12fd63c18cc5dc4defc7ea82f421050e668f68548
SHA25666abf3a1147751c95689f5bc6a259e55281ec3d06d3332dd0ba464effa716735
SHA51265f8397de5c48d3df8ad79baf46c1d3a0761f727e918ae63612ea37d96adf16cc76d70d454a599f37f9ba9b4e2e38ebc845df4c74fc1e1131720fd0dcb881431
-
Filesize
22KB
MD541a348f9bedc8681fb30fa78e45edb24
SHA166e76c0574a549f293323dd6f863a8a5b54f3f9b
SHA256c9bbc07a033bab6a828ecc30648b501121586f6f53346b1cd0649d7b648ea60b
SHA5128c2cb53ccf9719de87ee65ed2e1947e266ec7e8343246def6429c6df0dc514079f5171acd1aa637276256c607f1063144494b992d4635b01e09ddea6f5eef204
-
Filesize
23KB
MD5fefb98394cb9ef4368da798deab00e21
SHA1316d86926b558c9f3f6133739c1a8477b9e60740
SHA256b1e702b840aebe2e9244cd41512d158a43e6e9516cd2015a84eb962fa3ff0df7
SHA51257476fe9b546e4cafb1ef4fd1cbd757385ba2d445d1785987afb46298acbe4b05266a0c4325868bc4245c2f41e7e2553585bfb5c70910e687f57dac6a8e911e8
-
Filesize
22KB
MD5404604cd100a1e60dfdaf6ecf5ba14c0
SHA158469835ab4b916927b3cabf54aee4f380ff6748
SHA25673cc56f20268bfb329ccd891822e2e70dd70fe21fc7101deb3fa30c34a08450c
SHA512da024ccb50d4a2a5355b7712ba896df850cee57aa4ada33aad0bae6960bcd1e5e3cee9488371ab6e19a2073508fbb3f0b257382713a31bc0947a4bf1f7a20be4
-
Filesize
20KB
MD5849f2c3ebf1fcba33d16153692d5810f
SHA11f8eda52d31512ebfdd546be60990b95c8e28bfb
SHA25669885fd581641b4a680846f93c2dd21e5dd8e3ba37409783bc5b3160a919cb5d
SHA51244dc4200a653363c9a1cb2bdd3da5f371f7d1fb644d1ce2ff5fe57d939b35130ac8ae27a3f07b82b3428233f07f974628027b0e6b6f70f7b2a8d259be95222f5
-
Filesize
18KB
MD5b52a0ca52c9c207874639b62b6082242
SHA16fb845d6a82102ff74bd35f42a2844d8c450413b
SHA256a1d1d6b0cb0a8421d7c0d1297c4c389c95514493cd0a386b49dc517ac1b9a2b0
SHA51218834d89376d703bd461edf7738eb723ad8d54cb92acc9b6f10cbb55d63db22c2a0f2f3067fe2cc6feb775db397030606608ff791a46bf048016a1333028d0a4
-
Filesize
324KB
MD504a2ba08eb17206b7426cb941f39250b
SHA1731ac2b533724d9f540759d84b3e36910278edba
SHA2568e5110ce03826f680f30013985be49ebd8fc672de113fc1d9a566eced149b8c4
SHA512e6e90b4becf472b2e8f716dbb962cd7de61676fcce342c735fccdc01268b5a221139bc9be0e0c9722e9978aefaae79c10bc49c43392aa05dd12244b3147aeffc
-
Filesize
135KB
MD5591533ca4655646981f759d95f75ae3d
SHA1b4a02f18e505a1273f7090a9d246bc953a2cb792
SHA2564434f4223d24fb6e2f5840dd6c1eedef2875e11abe24e4b0e9bc1507f8f6fd47
SHA512915b124ad595ee78feab8f3c9be7e80155445e58ed4c88b89665df5fb7e0a04e973374a01f97bb67aaa733a8ce2e91a9f92605ec96251906e0fb2750a719b579
-
Filesize
429KB
MD5109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
Filesize
1.2MB
MD5fc57d044bfd635997415c5f655b5fffa
SHA11b5162443d985648ef64e4aab42089ad4c25f856
SHA25617f8c55eba797bbc80c8c32ca1a3a7588415984386be56f4b4cdefd4176fb4c3
SHA512f5a944230000730bc0aad10e6607e3389d9d82a0a4ab1b72a19d32e94e8572789d46fb4acd75ad48f17e2bbc27389d432086696f2ccc899850ff9177d6823efb
-
Filesize
140KB
MD51b304dad157edc24e397629c0b688a3e
SHA1ae151af384675125dfbdc96147094cff7179b7da
SHA2568f0c9ac7134773d11d402e49daa90958fe00205e83a7389f7a58da03892d20cb
SHA5122dc625dbdf2aae4ade600cca688eb5280200e8d7c2dfc359590435afe0926b3a7446cc56a66023ee834366132a68ae68da51a5079e4f107201e2050f5c5512ad
-
Filesize
81KB
MD57587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
Filesize
72KB
MD572414dfb0b112c664d2c8d1215674e09
SHA150a1e61309741e92fe3931d8eb606f8ada582c0a
SHA25669e73fea2210adc2ae0837ac98b46980a09fe91c07f181a28fda195e2b9e6b71
SHA51241428624573b4a191b33657ed9ad760b500c5640f3d62b758869a17857edc68f90bc10d7a5e720029519c0d49b5ca0fa8579743e80b200ef331e41efde1dc8c9
-
Filesize
172KB
MD57ddbd64d87c94fd0b5914688093dd5c2
SHA1d49d1f79efae8a5f58e6f713e43360117589efeb
SHA256769703fb1ba6c95fb6c889e8a9baaea309e62d0f3ca444d01cc6b495c0f722d1
SHA51260eaad58c3c4894f1673723eb28ddb42b681ff7aafe7a29ff8bf87a2da6595c16d1f8449096accdb89bd6cda6454eb90470e71dde7c5bd16abd0f80e115cfa2d
-
Filesize
8KB
MD5c73ec58b42e66443fafc03f3a84dcef9
SHA15e91f467fe853da2c437f887162bccc6fd9d9dbe
SHA2562dc0171b83c406db6ec9389b438828246b282862d2b8bdf2f5b75aec932a69f7
SHA5126318e831d8f38525e2e49b5a1661440cd8b1f3d2afc6813bb862c21d88d213c4675a8ec2a413b14fbdca896c63b65a7da6ec9595893b352ade8979e7e86a7fcf
-
Filesize
6KB
MD5ee44d5d780521816c906568a8798ed2f
SHA12da1b06d5de378cbfc7f2614a0f280f59f2b1224
SHA25650b2735318233d6c87b6efccccc23a0e3216d2870c67f2f193cc1c83c7c879fc
SHA512634a1cd2baaef29b4fe7c7583c04406bb2ea3a3c93294b31f621652844541e7c549da1a31619f657207327604c261976e15845571ee1efe5416f1b021d361da8
-
Filesize
155KB
MD5e846285b19405b11c8f19c1ed0a57292
SHA12c20cf37394be48770cd6d396878a3ca70066fd0
SHA256251f0094b6b6537df3d3ce7c2663726616f06cfb9b6de90efabd67de2179a477
SHA512b622ff07ae2f77e886a93987a9a922e80032e9041ed41503f0e38abb8c344eb922d154ade29e52454d0a1ad31596c4085f4bd942e4412af9f0698183acd75db7
-
Filesize
104B
MD5774a9a7b72f7ed97905076523bdfe603
SHA1946355308d2224694e0957f4ebf6cdba58327370
SHA25676e56835b1ac5d7a8409b7333826a2353401cf67f3bd95c733adc6aa8d9fec81
SHA512c5c77c6827c72901494b3a368593cb9a990451664b082761294a845c0cd9441d37e5e9ac0e82155cb4d97f29507ffc8e26d6ff74009666c3075578aa18b28675
-
Filesize
885KB
MD51f0af45ebb41a281e1842cf13ec0a936
SHA1ed725de3bfb61f9614d76497ce88488925502977
SHA25618c9929344a096d80a051b2513c1c91ca89ba22c9e8d24240faf1566767a9e66
SHA5123c414d6ea6f929d9710ffb9a8dbfa737b36ded9b2cdf8260d6a8a9224ffb005e1dc090d331b9f69b9c7c8871570f437288fcc3c8b51dd619df9975d374085c8c
-
Filesize
63KB
MD5f16a3a537f873f3e7bd334d6cf93c525
SHA14fbedba1adbeda56019534b1bf74ff47ed814e61
SHA256ba599c53479ad87732d7d5dab8a4cca44bb55cbc134e6054ddb6414e9cfd1508
SHA512032ec3782acaa2d21b24b8aae659e2bede424e594fee00aafbcf66840a8fd048fceae7ef2a8ad449a38590041d241c7edd1c219e9b5ffb3b5e8993a01ba4011a
-
Filesize
2.0MB
MD57a5c53a889c4bf3f773f90b85af5449e
SHA125b2928c310b3068b629e9dca38c7f10f6adc5b6
SHA256baa9c3a0d0524263c4f848056b3f1da3b4bb913162362cbcabe77ce76a39870c
SHA512f5943687d7e098790581bf56ac6fec3b7e9b83d0e29301077a8bc48768c5a0e9f54f53d926f9847885f6035a2b31e456e4e45ccf1c70be27229c46e79876e2ed
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
155KB
MD515bcd0e55422b4c66daa0e0035957022
SHA1f518408189f2838c43a2368cbe5b64d175756ef1
SHA2569744b9e816e55b38f81961943c1d8dbc470a9b065dabb154bfb9d9c2858004ca
SHA512f500e390d060b9b159fde88df6cd4ad412c027bc69be315c7a0e4bb3e57d2674e4da401b9aac4e73585412ea3611fa7be9383c310015b6e202f7d6615085bb26
-
Filesize
20KB
MD556b941f65d270f2bf397be196fcf4406
SHA1244f2e964da92f7ef7f809e5ce0b3191aeab084a
SHA25600c020ba1cce022364976f164c575993cb3b811c61b5b4e05a8a0c3d1b560c0c
SHA51252ad8c7ed497a5b8eed565b3abcbf544841f3c8c9ec3ca8f686846a2afd15ac4ac8b16abf1cb14aeca1a2fb31f3086ad17206ec4af28e77bae600dca15e8deab
-
Filesize
1KB
MD5d190a52995abdb7da147c6ca05fc37f0
SHA1f66b08a562fb913ffffc883bce55bd04e596978b
SHA2568e5a6ccbc4d5699466f05cf538d2c563cbe4d8c9dfccdb741ad842fe4f93ee13
SHA512cddbbf7920f59072208be3c26a907905e21d8a31e9f97915c4f9c2697b8903ae97c6a8178cc322a856b72fb9f53bed4b9599e33d5b5dcf52acfae48398787204
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5e21e0e4adcaac7651e9bb8aad4d4d845
SHA14f5dd8498c76a45843b2d9a17d6a0dcbf4af924c
SHA2564fd256151f8c7b63547846a3c117be1bb6fd24155a2b8b4c1578b233c37379fc
SHA51262e54d80841326d66b06c4643e679c6f1e10a6a0b3f3ce525a054dd2d4823fea378686406c98575cb4809a7e209c50d9def0e49458514ca55276aa00119edfd5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\pending_pings\54cf32c0-0867-4233-bd41-fe1462790234
Filesize746B
MD5a1b42de3183178e2a0a79783d5a07e5c
SHA1e5038f16f543e77e769a31c5feef99d0d13a1258
SHA256623dc7316844011a8aaaddd8ec687d7a9f96d0a5f62b0fe315bf22b4c7c256a2
SHA5120b783864b9d272b6cdfc7f1d188dbf9b8923c9fe72bc38c06a08b0651259c230f62a50bf7a35cf9e6fe0c8b0229caf08f8970701d3db12059fa40579536ece8e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\pending_pings\d6f46026-7392-4041-a493-004fdb0af3b9
Filesize11KB
MD5b38f585cf3e44baad32c884e4e78b0fc
SHA1297c00b45774c6da7d06c112711310a1c261ce13
SHA256719f4705b1911b52a285b6c0da50eade277b222064e0785bdf7f93e528963535
SHA512e8798e2610a88689c67ca8dfa53f5869769e4221a7b53bb5d589473bc848ac2b712451ee4e466e600faa47014299cc747077a8aece9bed4816a08f32bb4dfca1
-
Filesize
6KB
MD567d09ab0b86f925e8e48be2de032b12a
SHA191bf1c0cc54db7a50221245b1d8db72077fa4273
SHA256488cf6f5d218ce4a902c5bb74608ae9d10b08583984adf76bdc39bf5c97dd884
SHA512639502f22f8d6216a53ab8056438fb16c3c48f38202994be20d204be34f7e02d482357d5b895e6d291ecaf9edebd94a5878f24ce662546f5508bf8eebc959ef0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5e1984d1fe882631bb8474f268837c865
SHA16330ec2a986a039487c5029bebf383f9bf28208e
SHA256aabe1ec06acfe21fb0283d0813af67c7776ade1db629096636058e08bed779b3
SHA512b257653fe1f380b67140cf3b1867e21d33c65aea8dbece871b0612201843acd9bbd47c184fa5ddc30e5ec5a7ba749ea56bc6f2e971c142ea5de99acc803793c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\sessionstore.jsonlz4
Filesize2KB
MD504986fad2f20df6a3183b117dc35fe78
SHA1388fb4443943a3910e156e0a03c3c4245bd85a6d
SHA25615a82929a75deadcfb1f4ac1dd82ece2cf161ec4f43f291a81548441f0d786f1
SHA51212f6ebdd1577e6827e685cd8d9b123097dc051860f4fe946329339b809b4883e6006b4b4e4eba30746b39c3438f13f992c9ffa14d70cd2745604ef5107566106
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD50d0013d9708d9fef539adc917f5b87f6
SHA15e071e6b4d8abf007c8bb78ee948caf5bb0439e1
SHA256f416d29cdbaa66b7d04483831d2a593a735316fafb643414a12df78da0ab054b
SHA512851e9965a0fed9e0f5195ce655635cf13687d18678e4a9df807ab22cbc53c02cd2006fd65d93cd80b2a06d709e59122ea9933ba5cec551c6d51f5e9b4c175388
-
Filesize
16B
MD559e12a588c58c916f53a9d9c3f7f9f34
SHA163ddc877723ddcdc73515ade0616af0c83cf7814
SHA256feccb2024bd0431e9cfa09b0165a0f9dbf9c2a9620e4af19b9e5f3bcccc544aa
SHA512ab1d5a2ab2cc5700c9555e00081270509b7a36ce5a1fd29c1daf5f5111edbc6ec0f891a30a2d782cc2b8e1160b2e4dedb0b2fbf59424f1680774044d52c074f5