Analysis
-
max time kernel
206s -
max time network
208s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-08-2024 22:39
Static task
static1
Behavioral task
behavioral1
Sample
RubixLauncher.exe
Resource
win11-20240802-en
General
-
Target
RubixLauncher.exe
-
Size
355KB
-
MD5
8a6f1580a5b9b94d7cd47cc6b1af1b9a
-
SHA1
e68768afd59e18091d345cb300e859572e8d4c5c
-
SHA256
bb1464e75c750d90c0c49d148c9e64eefe0c29b2f670d708c8085ddd3104dbfe
-
SHA512
1663a9e0868b3f5d7e1edd30259024e419c2d190ec8c31e76e66aef0c8a0e02da0c829584214b9e2f76cbd349a53bf77d01d03e9b0e9c8a99eb18021b1d53309
-
SSDEEP
6144:g2qezd2ab1/RuHk+M3k8M3W7XomjOJCqshrOlumY6DMIewgxQfqhsb:gf2R/EEkCQFYDwRqW
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RubixLauncher.exedescription pid Process procid_target PID 1480 created 2520 1480 RubixLauncher.exe 41 -
Drops file in System32 directory 2 IoCs
Processes:
chrome.exedescription ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RubixLauncher.exedialer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RubixLauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Checks processor information in registry 2 TTPs 11 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exePOWERPNT.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
POWERPNT.EXEchrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133673712473622334" chrome.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid Process 4120 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
RubixLauncher.exedialer.exechrome.exechrome.exepid Process 1480 RubixLauncher.exe 1480 RubixLauncher.exe 3868 dialer.exe 3868 dialer.exe 3868 dialer.exe 3868 dialer.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
chrome.exepid Process 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
Processes:
chrome.exefirefox.exepid Process 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe 1344 firefox.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid Process 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
POWERPNT.EXEfirefox.exepid Process 4120 POWERPNT.EXE 4120 POWERPNT.EXE 4120 POWERPNT.EXE 4120 POWERPNT.EXE 1344 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
RubixLauncher.exechrome.exedescription pid Process procid_target PID 1480 wrote to memory of 3868 1480 RubixLauncher.exe 81 PID 1480 wrote to memory of 3868 1480 RubixLauncher.exe 81 PID 1480 wrote to memory of 3868 1480 RubixLauncher.exe 81 PID 1480 wrote to memory of 3868 1480 RubixLauncher.exe 81 PID 1480 wrote to memory of 3868 1480 RubixLauncher.exe 81 PID 2560 wrote to memory of 4108 2560 chrome.exe 89 PID 2560 wrote to memory of 4108 2560 chrome.exe 89 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1484 2560 chrome.exe 90 PID 2560 wrote to memory of 1192 2560 chrome.exe 91 PID 2560 wrote to memory of 1192 2560 chrome.exe 91 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 PID 2560 wrote to memory of 3220 2560 chrome.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2520
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\RubixLauncher.exe"C:\Users\Admin\AppData\Local\Temp\RubixLauncher.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1480
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5028
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\Downloads\PopShow.odp" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4120
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84fcbcc40,0x7ff84fcbcc4c,0x7ff84fcbcc582⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1792 /prefetch:22⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1384,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2148 /prefetch:32⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4368,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4364 /prefetch:12⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4584,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4980,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5020,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4588,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3792 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4300,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3248 /prefetch:82⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5132,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4628 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4312,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4932,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3760,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3776,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3424,i,10790587289901931468,11097286472713115297,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3816
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:1684
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1344 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1964 -parentBuildID 20240401114208 -prefsHandle 1880 -prefMapHandle 1720 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb016d2c-f96f-4b00-8468-157e9035e8a0} 1344 "\\.\pipe\gecko-crash-server-pipe.1344" gpu3⤵PID:4768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2364 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2352 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ef269ec-7f23-465a-88f5-7502e307a5fe} 1344 "\\.\pipe\gecko-crash-server-pipe.1344" socket3⤵PID:4076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3112 -childID 1 -isForBrowser -prefsHandle 2828 -prefMapHandle 3232 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd4d5fe3-8d2b-43d0-adb8-96639106e0a1} 1344 "\\.\pipe\gecko-crash-server-pipe.1344" tab3⤵PID:1876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3084 -childID 2 -isForBrowser -prefsHandle 3596 -prefMapHandle 3580 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82facd67-94d3-4e3d-8d38-0954f3c1836f} 1344 "\\.\pipe\gecko-crash-server-pipe.1344" tab3⤵PID:648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2812 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4472 -prefMapHandle 2576 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0397b1d1-ea05-443b-9980-10729d749941} 1344 "\\.\pipe\gecko-crash-server-pipe.1344" utility3⤵
- Checks processor information in registry
PID:2192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5404 -childID 3 -isForBrowser -prefsHandle 5416 -prefMapHandle 5436 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3dd4d9a-2dc8-4020-9179-8020419a6506} 1344 "\\.\pipe\gecko-crash-server-pipe.1344" tab3⤵PID:5108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 4 -isForBrowser -prefsHandle 5296 -prefMapHandle 5236 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d94fc966-bc7c-4b5b-8f35-48c8f0a4577a} 1344 "\\.\pipe\gecko-crash-server-pipe.1344" tab3⤵PID:3648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5752 -childID 5 -isForBrowser -prefsHandle 5828 -prefMapHandle 5824 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f811bce-aeeb-4807-ab02-3c293ae94f05} 1344 "\\.\pipe\gecko-crash-server-pipe.1344" tab3⤵PID:5076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6172 -childID 6 -isForBrowser -prefsHandle 6156 -prefMapHandle 6164 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a963af4-f5a2-417f-a271-98656b661dd0} 1344 "\\.\pipe\gecko-crash-server-pipe.1344" tab3⤵PID:464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
19KB
MD5257f0afac76de3acb9e1f71373d881c8
SHA1682c7c1fc3b7add11a12d707ff41000aea44b01c
SHA25650c7231c1fa76641249c4800e23cfa4f8829e9e9295378146801eed22f1ff2cc
SHA512f57465233a74469bb2b980c7e524f1bb4fa2dbd6dc7314c9b29ed3739666c7da2df6392419857a39b92acd2224f08a0ea1c50f52fabed75b32805774c632d7f5
-
Filesize
280B
MD56b3fed9df39d100f1be0e8556c3bf5a9
SHA1fb396773eb68c28e84676d14032383d20d264064
SHA256e5a9e3bfebc7455daa49570af99aa3297d0a704297db0ba71b686133e7e91d64
SHA51242336b03553f620261639da8f77dc462b5adb60f92161c3d22f8cbdb38e2f9a9e9cc0fda9463e21b01386b578868ddac209ebfb381dd75801297ed35eb68b6f4
-
Filesize
216B
MD5d9f974ff738418bb834ec10faf6d4d24
SHA165e7475f0a21e39fb91e4687934372e3e71612b0
SHA256457736173b0dade70cf5d0f02561f2f6510aad1e21dc8982a0a29d885b920ec5
SHA512646661191f4bd8ae0efca55d61cb3fe3928bd2f217d6840ac9c69748ed9014a21b7d7cf6d68e9a4b5ce04c90d0855f78a98b70f9d577a297bec0215756cb2e42
-
Filesize
216B
MD5739257767f333aec70346500013643f7
SHA13f2c9e83822e87582edbea97e560a857448c4134
SHA256f13c79ddd5c53d5c693faceec897d1b0145af8579bdec1e3e57521f8d2ed770e
SHA5122d3a1de57364693cd6e2b613c3472d1bcaab126f3000112e716ccaa29ffad538455a5d3e87e7f8fe04dcd0140534a9ac971aa3db7ea684fd08a1bf79614a800b
-
Filesize
216B
MD5cc3b1550f2354f82c51c7a17f75277e9
SHA103892d9281a725406df062dc3747df57fe480d55
SHA256aff4999e3fc4ac7f85a24dfddde60400276b3a5ffccceeb169b7f7d1d1630c1f
SHA5123cdda6e920bfb6d1dc761a5095c92021dc78a8c9153ee60a3ffd10fe85151f1c3c904e943c0481b7cd5d01ac39d4e97c416f29e7fd1b7ff89eb32b037c728122
-
Filesize
216B
MD5ef78e33059bfb0a5d02f4f750d025aae
SHA1401a39499cd9da5d20dbe7720f4ff8112f7ddab9
SHA256c002c51a60066c06b4f2c32cfee47ca5a044d618b8f4eef7b1bc6fbbc3c2675f
SHA512f28bc63281ccd56fa218e6ffd8e57a870b071013583e4a8ce84fb2fd5859fac71ff015c474ed17b17732215396d50dad0f84d4a1396582f305526354461a3c04
-
Filesize
216B
MD51e4948570be908009e592c2d8e1fafab
SHA132c5c0546d798679250793d6c6ac080b873d2d59
SHA2568e6a18c809d2cea7fb15a994b81a3269ce3e7831b34f3181c1d719cbd91f8260
SHA51288aff441291f1aa2fdedd26ba437574669532728c5205c77d7a55a2f2a197f70aee392fb90441760cbd105efb13ab76f64eb85b14e284a2bb77552497b794426
-
Filesize
2KB
MD5742a85c4263fb3cc3432cb6f2e9cb484
SHA114740a6c52350ec91a3c5a5eef462d9ef106af1a
SHA256c452f6c27e92cb87d3f3f193ef6d9d6c349c4713419ab11b7b1edd33372506bb
SHA512e51f9e61f63fa3f95ca263ceaad59cb83500f61f36e11c327a238e0033e638d8c9299d47a94d5cebf4c8ffcc29bf1735012dc7a3455a03613f846004e18b29b4
-
Filesize
2KB
MD5d2a8fa0571bdf444096ba6c88b6f8107
SHA12dc13a8243ad576f95ce6586055dea7c15f534f5
SHA256f73b78ab66b443816b287ed0287f5f0643d926405238c7a15ba19c676936d0ea
SHA5129e80f6a970dd1632a80b31378a69f40942bb35aa83bcb4e695decbb53aaad8d550288e89d5dc706695b487a04a3dfef1664624ee2129c80f884b4093824c3381
-
Filesize
2KB
MD5a337376b988baf568d5a99adeb22433b
SHA12a8a0bacf4b669624659143e6ba3efd09ac0b6a9
SHA256c21d222c904cb499f3304185a838e26b9cbf70ede61ac09ca98e5662e9a36f14
SHA5122192212e640770e7005dd53fccaeb012bf8cc87cf79a635cd473d18a3941b1f86e6e750da51bbaa0e51821be2bfbe5b0218824b7e795ad91be24f0dff072b77b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD57c4be242e88398922066bab98a06b050
SHA1746e2d0bc849a083f186bb95858be8ef7666f772
SHA2562d21a3a51516508773d97c841de6da534355cb564cdc6e08e5bed9e54f4fdab6
SHA512920884a13fd44e2721015e795e76d869116621b5e5f0ef1c450a23ca96081fc4918fd59cdfe17fc2ef2cb86c7c184f56e9b2f4258b3df1de6163ee742b470902
-
Filesize
356B
MD575ab35367cadfa7248eb4d3c98d2ff9b
SHA106b3368123f551e571425c02a025d76737a2928d
SHA256e90ab7af991ab5628cc482ebba3ab782fbb231e05ac325572e450e9d1e5e88f1
SHA512998eececd2b55d1655b5a67677e3e99e3df47d5712f4a079f69c518f01bc76826af65213ce24cf16fe88563e6c2be4420089faf7cfc1da2cd9f03fb833a53ea8
-
Filesize
356B
MD52940b4fbc6095ded25b594b9a5e5f83d
SHA1f59be4e7af0951a9a985494677a24c8826d65cfa
SHA256e0e7cbff30e0627ae0760f61e64e718ce4ab0892f1ecaccccc6edbe87e821a07
SHA512b8c62d5e1af20f213591c1ce9ac49fbed251d193f74a8bfad47f1f679b496239bf8980b068ebd8d3e4c73cd1d205eb233e7fc90211323f0de94d91586ef7b805
-
Filesize
356B
MD5898f3f69ad31a7b983483fea92dcc05e
SHA114c6394ac1c9d01ebe1983d0266c850562b7f45d
SHA2562f61209ea68845931b030a49f0a4a230dc2a1b319facc44aa1b1fd1baeb3f74b
SHA512377701557713a4914106cde2a92feb63dd498a162c3f44831fa656d87ea4f0b7e77963c7d06e25227e3651a78113fbb9a070863f3a4f907099f965e5cb2f14cd
-
Filesize
9KB
MD51d649a6447adf7fbbea610149ff470c9
SHA178caaf4cf98444718180aca99c7fdebffc6b3260
SHA256efd01e630c23e07f3664e69ef0858c2402edabb4ecdf71e9a9e1fe7ce7306d76
SHA51223bcac46a55c2868fdb5b6d6d43f8f15885cb039c069fc94299328d7c2d1c0c9b0b78ba62b6ae4d00650fc836c459ec953bd8f7cfca1493f80c6757d8b89db8e
-
Filesize
9KB
MD58df948265bf3cca15dcfb3b0de2fcdad
SHA10d3f9136d26b031c95e26071b558fef464286c8c
SHA25693c58ae062b2a822af30a26942fbd906f76cc0a9c320ee45d7d9fd03924624cf
SHA512f79c9b9188c19df5f6d2c142ae5280db64341a6a2031de7a1251c214075633e3dec6afd4f8a4a18c7cf9ab5636af16198983d74c16082aaa235fd60b6fea61db
-
Filesize
9KB
MD57ed617b3b0adca96123ab5eae905d400
SHA1bae5e73aea1c9d7116ccd2436ea62242f5e772ca
SHA2562649e3ac91fb63df02b8ef6482cd7bfc8fa1c044e816f6a4f09b9fe3c08b894b
SHA512fda2fce1480d9035ce4777257a1dd77b7ecddef32afe9a4f2e0373d1dbc4d83aeb65b4062e6e921ad7b90af36bc970c4005a3c700f1897e9cf934dc2a5fee250
-
Filesize
9KB
MD576efc3ca82ee76aeccc13cdd013f0935
SHA17c8a47ac69c5b22bdf8080eae5a76f106597153a
SHA256084c7245d643c73bba30a17acf132d507b4311662217b8cb7568fd9ee612b134
SHA512925676e27441a53618dc90ff456f59d880887ba1b51368a29bafe4849fa78ee07eacfa9afd0026bda90e5729da50388003a93badc467f7b0f53e189702e3adf6
-
Filesize
9KB
MD532acd1aeb39ff8bfeb0da602530300cb
SHA1513876bb9ff2df77f927f3249ed1c847c1150027
SHA256a359d2e8a04703040c7d8d120fa0277475c2793c670634305d41fdd770f71fe6
SHA512ca7792be3c68e74af6092cd1520a058e2049fc4c3ea4465a3c07cac24e51c529d78221d34a41bed58e2024381ae141b0c0544e7334d303ab3b08162b1a5afb06
-
Filesize
8KB
MD52cde694811d79be8969a5fa1d3382be5
SHA1f13e5b9b8e6dd56289afe0f7ab423b10ed843ff1
SHA256a0ea7d616d4ecdd7ffda4bc15a7805eb545a19361bf0cef5c64336e84f278645
SHA51270390e5086953a959928f3355d98057283c8eab43f5b652f98d063ee4006e9e6807a50148dc636a12ad2d12676d65a8d18d7be637f99a6e062926dfe81905707
-
Filesize
8KB
MD5a3c58dcecdf998f718a85ec47fadd17c
SHA18a964141994d039803817c152e65c6721bc85027
SHA256550feaa324618a4037e126b42c523b250b7ccbe8cf1a97a2e1a1d47440f0220d
SHA512e556a00bffdf5f507e904d80508481b5b32e2b09725d2f2ae7a1b58af2760633203812380a2d3cb631fe38ed4a373ce9b636e365a2ed5e209d1a5b99db43b6f3
-
Filesize
9KB
MD577563ee42685fb2074aedb9e220a41f8
SHA120df397086474fe38a27ba1641dfc3b073b4b6be
SHA256ac93b262afba4ba324cd689ccd4126e8c11acc58e7187a2b387eb4f3e4e35720
SHA512a0f887ae0aef89c2d0c50a1e71ca4a7eaf46bf933e0e201e2978a28b595396f9eaaceb25e193734d4c31ee70b1e8e8893dd0b900ca095ff38c26c899027ccfb4
-
Filesize
9KB
MD579652b43c9a59e13e77cb2662476a6d4
SHA10832ec586d4e02f2c9300963ff9837ca9bed1c58
SHA2568a767759b407a724aa91ba14b71bcc2f48a81048e89bdcaaa02c9aa862afc028
SHA512d2a36be4e86fb316c98fdb1c18e469c68256f5a368752f2dcd43123414522d660b25caa99b1c53521f55fcb3691b00ea08b431cf0f73f9f2af0331dd2feb74b0
-
Filesize
9KB
MD59b4ae1863101453ed70c4503ba1b1502
SHA1599a5f4adca906d11991402d4e8a6d7b3536ae86
SHA25605c9b2901c0ab0d1a4f831b23fea63fc8c20d715f2bdaf95564c050165a75d14
SHA5122faecd2bd4953c78d0fc2ef1447e3ad705c737d3f8556ab5ad38a5ae853fb1e761c16b994cf70d217d0e4cd142d7272f4c8d47f4d7a9ed8786750934e9774e88
-
Filesize
15KB
MD5becead9352aa86bb916e15e976ee819e
SHA1bb4a4e16d52607eae6b573d30635d185f9f32159
SHA25605b859ba21baf1900372aafabc20c67bcedc917a30412e6429878b57a2a4163a
SHA512af219a01458c5ba1af4b9d0e10e5eaa5288600cda504854405378aa1b58d62b4d82374ad37d4cecb7a367a8a160a9101bbecec6b117f56038ad32d34e2040bd7
-
Filesize
239KB
MD53f2981cf05c92a7cda26e98ed8f9ffc0
SHA1cd745da5c5f4d0073cd99c5e9b58dc6bb6e08448
SHA2566162530396ca1c7ecc4892eb3792f47dc7403f5a286facba25cdbb60a18aad35
SHA51207cfacdebd91d2005821e4490e458fa85347d984e62090b36d25badafb6efad9de4769b5e51d87a09991c1039fd272e167a69623613a7e6f480fe00e636a8035
-
Filesize
197KB
MD5f687e0da8a88d5bc48566ddcba31fa36
SHA190fb046a1645e1ce699dd77a7f4c063a283743dc
SHA256b6ad6901f99baa5afb550a4cf4647c5ba5434023c119a6cd46f65a7b15ebf7b2
SHA512b6715a10ebbc41da1173ca428c9afe768da6232dec8eb28c05724beec25cdade739eadbe4d92a39daf437276374c3add70f8167c6748ffc29dd8d2b20ff6f025
-
Filesize
101KB
MD5111f8e8598e564ec07b4921033ce135f
SHA1cdad2b378b5932c7d9542179d8fa597e761fd568
SHA25665c3476ad93efbfd5ca857757afecf46490b4a9e783b0c87d6e66ea715e73e32
SHA5129e4a1b1e6fe06840f28cd44e1c5b623c78510c1ddd14df49220d66d8cefa1bc6eb855dce775afc81f4d310f05d584aff4f75cecbec017193fac7fc91c9e7ea34
-
Filesize
197KB
MD58599f27a7342c5ad2a10a832b6b54fcd
SHA1dd45e04385c39c3e1e79d8ebaa27da6d237fe01a
SHA256c79398509d8b7262c0bf76d63cac8ddc37cd5551e1cb5e6cb69921eaa6cabbfa
SHA5120233f776a0dffb02ea4ad6eaa86aa8d18d3cbc165fcb0ee48b8c112f3178a7a36a57e5a97abbd80595d571dc85c0ff0ed6999d2cc474e57eeecbe225351f5a33
-
Filesize
197KB
MD5cde9c348a8a361958e676dfdb0a14bae
SHA1abb228ced861abdca33a9f451e58c144eba742ad
SHA256777bb177dfff1663a05d8207d5384ca7d04821843f69616d67e55c7b8cdb7152
SHA5125c14a7e5bc44e20fc0c11ad26e1678d5624a08cd679065eaf850426fc580d75eb7fbaac2adc909f409d67b3fb104591c03aa49641acbb81c14d182be18b3bff1
-
Filesize
197KB
MD5e24b34a97a82713d0b4f0ebd00c84c7d
SHA1508f9a02989eccfd6ba565835ae62524ad2744e1
SHA256416069b411d92ce5e4d6154b30ab5ca117f5843f61af950322eed1cebeffb575
SHA512d1654e9c89e986c2dbe561878cf3e6711fc686181a6db5bec057ec65e8057e045147df809be8f22f6f7d86fe84c2206404b488aff8e153cbed1cd701576a8d36
-
Filesize
197KB
MD57d87b797ae59317b418893fee8780192
SHA1f7c680959d4de4f76bc6605de063662f88aea3dc
SHA25640c7a48bdcdc350a26dacbdfcc41d4f2e2e4f86402148a97a65ca0594cc0f0c8
SHA512ff5610140811a281b7f9d1c2f78ed7d781f249ba810753e9bf78adfb6a7ee7814732b3afeaf547eefd945d1c39a744a4c28114d4fd206016a3cf664fa62b6c5a
-
Filesize
218KB
MD536fb59a769423c055f3064b7f5b4227e
SHA1fd7a3c32d897c91d405be4b509b1999a31718107
SHA2562048bcf44950560243b6a0fb061fceac1a21e07c3c138c856b8f6af30497b4a8
SHA512cd650e7402abb2b1b463cdcf9028cc7990c3a6e9fcdbad75ec6f896fce56139f97a7092b1b0d1cf9e8514bd6a18dce15c471e9016da4d3cbea188e5a8221bc7b
-
Filesize
264KB
MD5d849d1f81cc54eb102f0a1b83bd5e454
SHA1763af063fd249055ec77c88c97390ab483127c81
SHA256e423a1bc7b4fa1f166487c31ffa5e1c54d57442aaefca4618c096aeac496f023
SHA512794316f59dab6f1434d8e08cb9736768d1a51b74e5bf1694f9227684102bdf6bdd5269c0f0274663a02f27a16d59282518dfdfef940b06d38977d42b1f616a26
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zgr882s2.default-release\activity-stream.discovery_stream.json.tmp
Filesize18KB
MD55e42318a296d8bd6458e901a0516e54c
SHA1412df2005e6bb586237c848e3109f3fef455a118
SHA2568e55c45fbbee135b56dbd02f4f4788ed28b837acdbfd7ccb477cd7590be3da53
SHA51200462d8f4365399a94308d6d685f7a03bc44f71194cd4e7d724e32b68049dbf69aa624b9dbe0b21477985c07d1767fe0cb01f735f35f959b3d001bb042ac597a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zgr882s2.default-release\AlternateServices.bin
Filesize8KB
MD5bfda8541ade6ed78509761b92d2a6234
SHA1245fc5d4dda7bbb39453888962749ce94f1ed6b9
SHA2569764d0c13142287648813aaecc4d33b47dfeae79620c836e032e2ce8ac4711ba
SHA51286faf55246d6aa7a5bef7d52421c2abea1e791383fd545a85e61e6c96403a6bbb1f856a0a405df5b966a95fcbe7090dd286138229f42a7db9ef6611cb4fe4714
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zgr882s2.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55fc1c91d65f324ba02a433813a3f6c92
SHA11a4f6ffff32bc71b4b25e7ad73f40f7cfb3f9382
SHA2562d2a4572a3b373c58ceb8f8f2f4058fe45e736fba1cbf8f9eb9af46221aac36c
SHA5120140eca799a24b908f41ca1978bbae2674889b476ae0420f24d4c781b3dbbe1c90c048fea699360146013feee97e247e5a5545491959b5af6f49c3a94922ac80
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zgr882s2.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5df9fcab4e1c7093b7b2ffe3e8eb24c6f
SHA10c28eb54558780fe3a74cb9d99cf605367dfcdc3
SHA2563072e8f1bf0ffd64f18b8a3cd9557c20b62c91e945ba881566a1d23f2bfb4c21
SHA512dc3ba6255f167082df9537f364b929ed28ea2f72b2244bf020cfb5dfabf5248e4580dfc82f5daaaae895558f0ad6be324b4dc8bbf1173a62e9b9a2832c6e14c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zgr882s2.default-release\datareporting\glean\pending_pings\1ab65206-05cf-4215-99fb-468ccce48aac
Filesize671B
MD5dc7e2f149ffeffbd0fa896c35b402c5c
SHA16981f54d5d8ff09c01197821def9509bffa2b1e9
SHA2560d6cc6781e421f74e8c34f18ee3729900f3f91db7bc874af196fb98fed920388
SHA512f25d63b9c5d891258d05aaeb10070a84a2f487e5a0d75ad664ff023fb93bb073ac3975b3409dbafaa52406e442bc189beaddbcb22d28d91eaba18d6a21a2f934
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zgr882s2.default-release\datareporting\glean\pending_pings\60644f2e-f40f-4f08-95e5-fae80096f0d5
Filesize25KB
MD577231219c76a13873711dd552fb22af9
SHA1f126a0cef4da325af21dbf45d87cdaf72325ec74
SHA256f553b2c0eea1f9ec1f8b24ccec5dfb541dc1f8951c22f2b18d6a198168b53763
SHA512fa64ce340d93c3bfde2119e773eeb219a58a2941560370ce100b736c2371331c3c72a10ebaf487c1d550f85064820032a688efc4d22fb792443103e08397c4ee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zgr882s2.default-release\datareporting\glean\pending_pings\92e1f6a5-625d-469a-98b3-a6b0aa183ee7
Filesize982B
MD59845ae356f992c4e68e70f8e925fb07c
SHA1305458d64ab73b41252b8982aab6648af3422293
SHA25636a9bf5b232af201e83472104cbb40056c3989bd27df668e64c0d512c7ab9a6c
SHA512fdc33388d09ee091757ff25370e04ec0f6c4de494a203f45aa22e4a5e36d2d1524a477a5174c67cb9d67fd2f6d6824c9ae98a5d480f42035fcda2872d80c0f09
-
Filesize
10KB
MD5f0638dd35f6bc6d74a2244f5d4c3a972
SHA13421fa6a741d3926013a648d579d3f6a20d827ff
SHA256a9e7e1334717edef3d5bb6cb3ae41327bcee20b55cab27d6093ca6a2ce768d48
SHA512a25859c6590293df470a7b882c220dd7085bfcde306ce1205d0ad0df56b892ccca2b82e93fa89a0a979f384af523cadee70c22e8c3c48604db79243e8f8ccab6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e