Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/08/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
9daeac604bc8f2e2e95cde6690bbf8b22d47e1c70bec15c3f8f603b396b2b0d1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
9daeac604bc8f2e2e95cde6690bbf8b22d47e1c70bec15c3f8f603b396b2b0d1.exe
Resource
win11-20240802-en
General
-
Target
9daeac604bc8f2e2e95cde6690bbf8b22d47e1c70bec15c3f8f603b396b2b0d1.exe
-
Size
89KB
-
MD5
c69ac7b65d67f046cba1ef1f35a5aaa7
-
SHA1
8f57e81c00c801c3a057f7438ac8c4e82834162c
-
SHA256
9daeac604bc8f2e2e95cde6690bbf8b22d47e1c70bec15c3f8f603b396b2b0d1
-
SHA512
2e3407757ec766b61f5be53c930dbaa0b16833ee5a7892105e6a66d5cdefd4423742de1f1cad2354a4a878c46d8669a4685204d3fb87bcf22f85576d9a1133ae
-
SSDEEP
1536:L7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIflxZCRO+:Hq6+ouCpk2mpcWJ0r+QNTBflvC3
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9daeac604bc8f2e2e95cde6690bbf8b22d47e1c70bec15c3f8f603b396b2b0d1.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133681158144716235" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1735401866-3802634615-1355934272-1000\{F646DD9E-C04B-4142-8879-C0B2576174FA} chrome.exe Key created \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1132 msedge.exe 1132 msedge.exe 4328 msedge.exe 4328 msedge.exe 2736 chrome.exe 2736 chrome.exe 3708 identity_helper.exe 3708 identity_helper.exe 6340 msedge.exe 6340 msedge.exe 2268 chrome.exe 2268 chrome.exe 6124 msedge.exe 6124 msedge.exe 6124 msedge.exe 6124 msedge.exe 2268 chrome.exe 2268 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeDebugPrivilege 3472 firefox.exe Token: SeDebugPrivilege 3472 firefox.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 3472 firefox.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3472 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 984 2852 9daeac604bc8f2e2e95cde6690bbf8b22d47e1c70bec15c3f8f603b396b2b0d1.exe 78 PID 2852 wrote to memory of 984 2852 9daeac604bc8f2e2e95cde6690bbf8b22d47e1c70bec15c3f8f603b396b2b0d1.exe 78 PID 984 wrote to memory of 2736 984 cmd.exe 82 PID 984 wrote to memory of 2736 984 cmd.exe 82 PID 984 wrote to memory of 4328 984 cmd.exe 83 PID 984 wrote to memory of 4328 984 cmd.exe 83 PID 984 wrote to memory of 3676 984 cmd.exe 84 PID 984 wrote to memory of 3676 984 cmd.exe 84 PID 2736 wrote to memory of 4820 2736 chrome.exe 85 PID 2736 wrote to memory of 4820 2736 chrome.exe 85 PID 4328 wrote to memory of 3880 4328 msedge.exe 86 PID 4328 wrote to memory of 3880 4328 msedge.exe 86 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3676 wrote to memory of 3472 3676 firefox.exe 87 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 PID 3472 wrote to memory of 2976 3472 firefox.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9daeac604bc8f2e2e95cde6690bbf8b22d47e1c70bec15c3f8f603b396b2b0d1.exe"C:\Users\Admin\AppData\Local\Temp\9daeac604bc8f2e2e95cde6690bbf8b22d47e1c70bec15c3f8f603b396b2b0d1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B5D3.tmp\B5D4.tmp\B5D5.bat C:\Users\Admin\AppData\Local\Temp\9daeac604bc8f2e2e95cde6690bbf8b22d47e1c70bec15c3f8f603b396b2b0d1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffb016dcc40,0x7ffb016dcc4c,0x7ffb016dcc584⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2324,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2320 /prefetch:24⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1760,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2380 /prefetch:34⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1924,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2540 /prefetch:84⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3132 /prefetch:14⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3168 /prefetch:14⤵PID:6064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4388 /prefetch:14⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4548,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4568 /prefetch:84⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4584,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4552 /prefetch:84⤵
- Modifies registry class
PID:5464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5260,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5272 /prefetch:84⤵PID:5188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4916,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4904 /prefetch:84⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5068,i,18008656858967059832,5380095248951434825,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4760 /prefetch:84⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x110,0x114,0x118,0xec,0x11c,0x7ffb00c83cb8,0x7ffb00c83cc8,0x7ffb00c83cd84⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:24⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:84⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:14⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:14⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:14⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:14⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:6340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:14⤵PID:6412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:14⤵PID:6420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,3091714854352803192,14339973986367933737,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5168 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:6124
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"3⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1860 -prefMapHandle 1852 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1ffe830-fe88-472e-8071-fa7145e02250} 3472 "\\.\pipe\gecko-crash-server-pipe.3472" gpu5⤵PID:2976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2384 -prefMapHandle 2380 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9767bd12-29ea-4c65-83ef-a412680c43c2} 3472 "\\.\pipe\gecko-crash-server-pipe.3472" socket5⤵PID:4760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2812 -childID 1 -isForBrowser -prefsHandle 2824 -prefMapHandle 3184 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {93073a80-2919-491d-a648-ad1669ad508b} 3472 "\\.\pipe\gecko-crash-server-pipe.3472" tab5⤵PID:2948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1456 -childID 2 -isForBrowser -prefsHandle 3344 -prefMapHandle 2540 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea2ad166-5614-4f3d-8c9e-2fc20f51e6f0} 3472 "\\.\pipe\gecko-crash-server-pipe.3472" tab5⤵PID:4140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4524 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4740 -prefMapHandle 4508 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75db4b55-3514-4501-9356-f1b4d1c7574b} 3472 "\\.\pipe\gecko-crash-server-pipe.3472" utility5⤵
- Checks processor information in registry
PID:5748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5320 -childID 3 -isForBrowser -prefsHandle 5372 -prefMapHandle 5368 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e080bc18-2113-404f-a910-aee26a69860d} 3472 "\\.\pipe\gecko-crash-server-pipe.3472" tab5⤵PID:5616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 4 -isForBrowser -prefsHandle 5504 -prefMapHandle 5508 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f90ba519-66d1-4d60-bc54-416415e7c0a7} 3472 "\\.\pipe\gecko-crash-server-pipe.3472" tab5⤵PID:5628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5724 -childID 5 -isForBrowser -prefsHandle 5484 -prefMapHandle 5492 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {45219012-2b2b-41cf-a61a-3a3950925cd9} 3472 "\\.\pipe\gecko-crash-server-pipe.3472" tab5⤵PID:5648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6196 -childID 6 -isForBrowser -prefsHandle 6220 -prefMapHandle 6216 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5479fa74-e66f-4de1-9eab-40cf0be3574e} 3472 "\\.\pipe\gecko-crash-server-pipe.3472" tab5⤵PID:5604
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5b0081fac2790396db54119f88999a8a9
SHA1bb8fc9a4adaccdb5d8b2098d7f7d3764ea777aa8
SHA2566cfa339f1673233374c544e2a80fb27128846b3327dd2bc4bfef6292f6f4e473
SHA5127c5766ea512e4b48ed16c80a0983041127ca4636707c9cdd8d6a7d4fb7566aab180a6984fd6dd757b92e7553fe44128d279ebbd9d6f48ea025b09923ff0a0251
-
Filesize
384B
MD539acd6732e06d395440542ffdbc5e131
SHA1379644113d37dfeaa3e0e0923cddae0699e31887
SHA256b67c3c3c480c4d9266b6eb68b47d01b067ff68e47c1b076e812923fc6b39c5cf
SHA512b91a6081b52778de24ed383294fdac3122a906dfa90b0f8db72af1cd6c8ecfcdffd06ebfef6a756673aa2a5b7ec2cbf0d255c865ba85571e43568667e77c1e7f
-
Filesize
2KB
MD54d66d3d05e6e436398edaa47bbe67937
SHA1874525df7d2ffedcfd1bff6aa90c0396decca6e4
SHA25657bd30188c7a0a7f30cd0cc437abd54ad8e80827b0408e9a6c4c1c94bfccd374
SHA512df6123dced1036e814fd1c7f7663bb21b05868caf842d8fa69b5cc5ccb81559d6f0841570fdb3d59b0e35057cce9a5484a9b6af0a72d5617a3e0c9e6605144a5
-
Filesize
3KB
MD5e35a2a1d4bc9f40776a27bb3b81fd172
SHA1e687beacceb9b1d04bacda2b9a32a3a098e90208
SHA2560a41bb1a4aca5704acedbb14f8de64e3ff66571724af5e28e955aa36f68e3ee6
SHA512f8ad0882b44324551859ef1817abc0a3e6b402ce4962d0a721f2fee1f9580d0a6c73cf1afffedd583806c073f69278f874944d0b1027024270ee5df21eba74a1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5c2dad039152ab873b251ff4a9aa1a0da
SHA1a9d65954a2a5a76990a474979b909a30e98684d0
SHA256df44072dc2bd6f4e0ac17019ce38bf9349b7810f7eefc8aabdc61f439fb9424e
SHA512f6650af3b67aea29a003e78d2f52d7089b53851924a818fad32fd76c87235c2b6afa19379f24df689b4a74a231ebabb41f10a95667d329a3ed6799eeb7a4d8a2
-
Filesize
356B
MD5597e9d863097b8c21474b81786913d18
SHA166c640f66bf4a51342cbbd20206ca13fb687b2c9
SHA256cf1e9067abeba08dc89e516cbf800c37bb0314485e7bd07438a38de137896760
SHA51289106fa211d214460b30a68b5991c4c8fb2e1f1a5cae612ba1c4dc46b884c980939aa62309e69252f0b8afad4a6dac092f9a85478edae44596419037a73f27f9
-
Filesize
356B
MD51f9203a6b5fa30c83b629744084573fa
SHA18a85ca4249a634947fae62c5d0a02db92b9576d2
SHA2561e571ca821456bb816e45309ca46c0380f996dfac0a2c8bf1922d0c3bbb187b8
SHA5127d8af643f27c494bbf03cff102c2e2c992ce8d39ab8dc3f8a1927f0a70191438f74416af9833982230981774a118aec24fbdb28250d1d3996bb5506e7a08388d
-
Filesize
9KB
MD553e791ad71de2cdbabb89fcc6b6e1ea9
SHA1eade1abf8c0d3871516b876292aa3c61bdef3ed6
SHA256e9448866c76548e2f48c525b3e45923501fca6404174cad46da762811cb54898
SHA512c274737b1ccad03686a392620ca28fd74bac3c8843de5ccf90ff336a54890cdd49bbe6a37c81faab05c3a0173155cee6c3b056ba592082917ef6ae28150b1ee4
-
Filesize
9KB
MD5c632b2fa66687d08976ff73ac37b44f8
SHA1bab4b1129ec7f3e7526d51f349726a2144541d48
SHA256b2b98c5ec6bf111bd7f1f0fb41d4ecacd1df9c3b0eb49f6203f9bb9b4d90da25
SHA512042728aa7fa3ce04683d10cccc932bb8d1939cafe9a999455dd605c5831da4fe00ae1ce16b90ce30a96930f988c390ad4c0b7d40dab3ab9cf6a665489f07da17
-
Filesize
9KB
MD531b5e28809d42130d76c953a7a6bcdff
SHA1f849c8aec326a9bcb77f0862dea5722293ede281
SHA2567b1b7364614270d9a04fff31d0ba932acb576c2ef8c32ac968a04a6f373cd350
SHA5123fe2bc662d5d51c2e60b31662c300616a5a73fde5b0a50e049fe8ff36e5042494b605022e720542310990581b9f06cdc25d39220d73c7250e8c63720881acbc0
-
Filesize
9KB
MD50e4cb90d2267d20448bd70944e51aee4
SHA16add04e2989f7af3016f293185bfa099c736c186
SHA2563ffe14689e45f8daca2231b10c233e0903a5e8b2b6eb621b8ac428e75f44478f
SHA5121cbe518a2909859c9f7d25ca2ec0c64f96d99dfe5a17e312f726f66d779d4b92b1d84532d31c49b9cc1aaf1dd53b24fdce2b225cda00c5662833ebc2278a13d1
-
Filesize
9KB
MD53e37efde0e7096c1efbeb9c372058ff8
SHA1eab514769971ea1dc9db12186da909ee63703b28
SHA256a1b7adc402b2000a9ba957b49f81db4a7db5eee92bcad91556eae0e319b1b734
SHA512873199ecc8a3a78a1132e5e871b3ae11e49d25baa5d20dcc90bc28d0ce259a2dd47d856dca547fac582f60ca37989af7dee22c19d7830ee0a42949eb2c795854
-
Filesize
9KB
MD55eb54660e6ff6cd1729e511e896d8e48
SHA1638177966ac7808bba2fc03a764d26cf1cf6a8c6
SHA2568a139a26ed6d9c08e525d1585e674fa5a37e32cb0be880705d2e53d0e68e6a3a
SHA512802e19d7b452d3511bfd498394a5de87a38d794661af3cf759ca74cafc083fa236fb6b49b34a8e243ea86aa17da26e87bccee4d98907ca2bb9d89973bda05019
-
Filesize
9KB
MD563cf565f3308b92c7dd5e33d81b7cf4e
SHA1555dd846a22cfd51dcc629b956f45abae22d499f
SHA256dd7c514cbbbb192554d2f4ad6e221142f8e9cd974b7f41e52648c381816f35c7
SHA51218c1aebd45deeda3b6a400379e1be88e6f28b5cdd07f5005a140354a1eb42aa50828169707923e90b831d8c5bdef92df36345899e7bef9d51d226942b2c7bde9
-
Filesize
9KB
MD58154f063887733fef290039ac0746115
SHA1b90e7298d5c2982ffaf405f19a954064c343f788
SHA25670bc5a337932d9c83a6eb6557c6852ffde5b201d5d0508e854759286363c0d89
SHA51233f1d8351c3dd2cb2fbaaf08e437e32c79517dcbaa3a7830842753ad6f829c61baa323c777868aa109f5af306fda8c9590656d004d112d001664ec8a8f683002
-
Filesize
9KB
MD5825f152951bfb51f3b11d7d2c068ee97
SHA141b53632b5c531acbaf54cb5c446fd40b7d86604
SHA256fa11d8ddfe0630a283e1645615d3b20974b9d0b92848fe41128c66d2c588b3ec
SHA512cfd346b04d89b226fe4d2e6a5d60b15bc2e38677adb470cae11c3e1575425ab90b3382b18e9fd40b6320ec20119204499afe387fabf99c7328eae7acb8a9d9e0
-
Filesize
15KB
MD5112c1ee5e03879b8421f3003a4b105eb
SHA146da666912c3738141f8219b974d65707e6c9479
SHA256199bbed0508b27999f994ebd416cb7def834cf1c00537a2764c548f68def348b
SHA5125431e8dc782f0cf13d34f8fa25f73d0ba753fc2e22513d1f94d9b30fb9396f3657fc8ff651a55da095ff27dea323d305429ca297343c14737b8a746a589a1161
-
Filesize
195KB
MD515cafd463624e74abda37cb395a9c456
SHA1ba8d2fc387a2bcda553b86b56bee7b2a6e648c1d
SHA2567b11b32d04148d49beda97496619dd2d3e4633028c56059bad4ab5800444637b
SHA512c216ed51c03f0232a716e4f5fea1002fe0ff48d96f05da6768a46f1102bffb3d0cf76521898a18778a5bbb8b15a06684277882d000e29b556269daaba9b9d9cd
-
Filesize
195KB
MD5597af33cbeed59992daa5882d067e2c1
SHA1db761e7056967167336a08a7ef084f106832afd9
SHA256b3ad8ae53a198571083f07dca2f4b94fdd1b6c32e4c04eeee562fd569c352462
SHA5125efc3a92bc88e18d4540656acb686cb1f71ad1de172b574a6c0dcc98366a4ab144593db5f25c653e2e528f2e7f30307903fc7d1ba0e7b1ebb394144b0bfd9893
-
Filesize
152B
MD59828ffacf3deee7f4c1300366ec22fab
SHA19aff54b57502b0fc2be1b0b4b3380256fb785602
SHA256a3d21f0fb6563a5c9d0f7a6e9c125ec3faaa86ff43f37cb85a8778abc87950f7
SHA5122e73ea4d2fcd7c8d52487816110f5f4a808ed636ae87dd119702d1cd1ae315cbb25c8094a9dddf18f07472b4deaed3e7e26c9b499334b26bdb70d4fa7f84168d
-
Filesize
152B
MD56fdbe80e9fe20761b59e8f32398f4b14
SHA1049b1f0c6fc4e93a4ba6b3c992f1d6cecf3ada1f
SHA256b7f0d9ece2307bdc4f05a2d814c947451b007067ff8af977f77f06c3d5706942
SHA512cf25c7fd0d6eccc46e7b58949c16d17ebeefb7edd6c76aa62f7ab5da52d1c6fc88bde620be40396d336789bd0d62b2162209a947d7ab69389e8c03682e880234
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD53b27869d14b5732475439bff380d569e
SHA11d482747596931095b88421454c2cca0fb17676e
SHA2569f2abff9cf66b0b8f8f5164547ae9c661d71fa0f924e110f373936b5f3654fd2
SHA512871d192cf1e0274b8d58f799dc55648524927b70a8137d5b366368885cfde44d4c319daabd7c91440170369718d20a592dcce5abe11a1852ec2608a5a4077262
-
Filesize
1KB
MD5ef61e2097eeffc3d9075216fcd4a4266
SHA1d213cb12c3cbd33f6f1f9704dab65c1e1de9bbef
SHA256b26c77143f8c2c90d8ae8f0f820d930ca79f41a6e4979e07801b8bcd62a7d81e
SHA512c9d796bb9704f7f33e0f3fa4628a06fbc06d7a30edeb5f747018050f00b1bde319929a51d936d80b47fb73ddc20bf863acd0130c9dd98fd21d386ab5db8cbf45
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD54504281e4e124339ac8bec3c5a0b4ec0
SHA111b6e75a53976d98d83962a4cce6c11a8475ac7d
SHA25666281acf5bbda51865f9653d89863c60392bc9871a381defb1de846ba626176d
SHA512157d8d7e9af76d79187080bfa4d8949bee169d0adc35099f6d7dbaf5af4c2b34f706c72899c5d03c10a72c15e1bd17f5028217393380df0ec1726bca718217c6
-
Filesize
5KB
MD566b783eca9d84ea92ea9c2bbe8c59da0
SHA19a1b165fbf196276cf1ef3697f0b241800811d36
SHA256f3566027e59bfba78e785d09467f8151c44451c67917fd5232f4cc3007b97bc3
SHA51268a78618744b8d093ed9ce05ee8f38ceda66384a29bbfe204d069e33fd6460d957c9ed13b7b41e49ff809a506fcb92dd937b3121fc98789ddf6d2dfdf7a7686d
-
Filesize
6KB
MD50a0722423146f769070598fb7e142669
SHA1b5fb9b7be1d057eb3f39b0f18769f69a355e6aa4
SHA256bb744acc1e4e322b328a31ae888152e884ee237c3a73bd361c8601a7e8a80356
SHA5129b945afac26ee8626c0e83615028a513a12b4497630275916f92d836cf0cfbc5a7201e0900167758166620f8e047bb28c2d2ced859da6f570b30b2234ea79c35
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b1a1e708b995b9d107a0c49d6eaea66b
SHA13fd2101c404031e5208a65266be71b46b6e3d440
SHA2563106b629da64707962e8f18c10a44a353578dd06ac2182cbb881f46baae03538
SHA512460156d0b811727fbfc3514290eedf0714d94ced85fb8465dc8d9219c690f7007314015d433024dd7f6adefc58be6e0ab28da657cd37f57a4e91a313c1966e14
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yel8o60i.default-release\activity-stream.discovery_stream.json
Filesize42KB
MD56452f3d08a5755abaa7248d214f9f354
SHA1877e33f48d0291f4d054de64a817195bd9377b25
SHA2568da97946c21640e64ddacf21d84756154cbc90e3079562051666c999611cce41
SHA512e685cceecdfbeda37d293f523acaf5590f76eed78f8fd46b1c2a91403ca5df1c861082f0f4f5ce12c989c888645a15aa9b68a148753c26e02dd442bef7316d54
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yel8o60i.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B
Filesize13KB
MD56bab217069f13d465c8856791c1cdad1
SHA1dd6ae96845b10136ddf6b99f3aba65d059f390ec
SHA2561c76ee34e4976acee00e418c08ad9250d770b070d66d3a4b241fd5a4fc366691
SHA51203459aa23555fcdfd40def2b2736175fc6e64dfaa5fd06069a9b61a6164aed8c57b744da44d8236bc73251118ce92c3d76d67f141599174930c30fe5e0545e3d
-
Filesize
2KB
MD54ac6a9d9e192f54598f8b67cf299ea5e
SHA1c3c63fc731603f581ab71bab7651a4d5112b04e6
SHA256f1179bc15a8c644c353af64d6c6c3f13fd2d48eed2fb0b709a167185d2ed806e
SHA5123ff1226c147403aa5afdc515f260849196dec92166273206256ce8437a98dc1dd3b2cf913861e7537ccf36d6bc53537bd49b600e9adb1671f4bdb3d6e3da23a5
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\AlternateServices.bin
Filesize8KB
MD5544f820d6c335939b9b611c4bca507a8
SHA190cf2adbff39d4e8fbb7b54e062dc964c7a61f0a
SHA2569e3f9a798246cbe98fc9e719b4688ae6dad6e9f4853d4571cb735db4200cca8b
SHA512d3a16745457eae125196c2277bdf7e01b31cd8f698b9d9fa3c3d0cc19df7abb1e69c7b001e3df00d52b41bbf306d59969f1c3e97de3c1a3fdce658c6d3990fe3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\AlternateServices.bin
Filesize13KB
MD53424f6993c21e36f992cb4c3fd617ea4
SHA1f2f99afcfb3b85fee854f85bd4335a9878601fca
SHA2565457dfa000b4ddad80fc2415a7462887f0c163c55809aa5bcb5fa98c6324233b
SHA5127381501577e41c2f6f134ada8e39c05e3df9766d136348f8c91f02c57288b18c001e69ab5ae5596e31823fddda2f0a012aeade31af2f3256871cc63242daaa29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a633453a2d56cb44a91bb82d427b2c4b
SHA1ec8e0c4dfb83ee6792eed65cca61832b89638df6
SHA2560826f4d4e925c1ab78f324ede11d70af29bedbcde53fee79656056c3e6b528d0
SHA512ba6d772c551411dc372329e5b0da9287114e31749923a5650d7174d765b756985692aeb0c43a322f4593b97cacf86c7289d907f80acc913c3e5a6677c56f4dda
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD557df9f96a8437e1feac059c75a8a7c36
SHA1155ff673b262203604b685448ee84c08a90fec85
SHA25657f176e2bccc1d8fb058183a3a76d0cbd605e95ca9dd34df6db2257369511031
SHA51284f4509507761ac43808387bed8d93d39c93d95a8b04ad8de567d74182a70d5e5de34f9b65c8be5516c221438612e3f0a847f4c9925a9e341e190a7abb95b5d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\pending_pings\1302a451-0931-4dd2-b96e-3577ae77eff5
Filesize25KB
MD5212a6d263b6d66ca93f17069a6e0eaa8
SHA175349f1f06cbd9c48288d550abcc37f77d3af99b
SHA256cf190285dbf00bf5e9749cf0e8c800009e4980d882ff41d6eaf1cdb51c500c4d
SHA512afc1e7451d30d2ee82692a54ac748143b974ee9c8574eb659fcd6c3a84cf5fc9682cfa405a1a59039f8e498e90fd67f4e4e9ff66d3d2ec45e7f3ce732ee45365
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\pending_pings\1bddf328-6fd2-47ba-a58c-ee6c9fa1f79f
Filesize982B
MD5f1a5f249556b1acb1907bc749da808de
SHA172e28dde08606418960fdd1fb2eede60615a3bd3
SHA2560e58c63f8af1cf21e51817dae548d7951608ddd09e65cf72a8e5c4046f5c2f45
SHA5126b2ecb793b5d1665ef6e157f531e80ecca60cc5b7b2d0dfc609847ce5548022003ad35fdd22b6231f4fc4cbaa0ff31bac7f55f4e975a75910c9db98f0215fed7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\pending_pings\6700110f-6afe-4825-8f0f-0ecc402482a8
Filesize671B
MD5bd79ea0888f8c3b2b7dfa0f0713b95fd
SHA155982b5c123a06932b6a840ce4791bc0b9a12a31
SHA2565624fa3cab89acbb1676f18223faacc9053f1b2d2f0dc15693069d8d99000a81
SHA5122f1c3830574a736d7f32b36bd69ea05df0394934cb9b6cf3dd0371fbda1e855529c5430557af768b044bd751cab8c0fb2f474d96ce3cb6859eaea043b237ff1f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5c0c1616b96f2e7c9567c918d534d685d
SHA1054d1aa8bbc2b6e3e951549639fae4f6dd77f39c
SHA2563b46f9b4c07e5bcb40a7bdcb5a9f1a479c6b36515a78d4339016fb2287208d6b
SHA512202cea5a5448de652eab5ce17e8b233e2ced3bce349f8e0034838c039848284ecd27f3e3ea5c68528a7c429ecef68cdd7e63ae52631e1198ff86f23accc20e37
-
Filesize
16KB
MD575b9a737f059c6baea65ad6680b078be
SHA1124d307c6110c4ec912cf494dddf362defc03200
SHA2562250e49fa41c3309e01648cacd4fcc7276a6dfb0b940ea7e8d012cd5a5c52235
SHA512fac410d3d8c2fe80b34c874236dc0a19d73a59f65d573ab12bd2a48efb8e4eb74be18196b4fb38af37542d9f22507e031f5737b77b7ff07305be936ffb10217c
-
Filesize
10KB
MD53a53f38ae17fa91feb747526e38fa73d
SHA14fa5914156208729b0388ab25d4b6e0dd59efe07
SHA256932b96b9240d396d80a1e5ff424357f970f75b22bd67612bb998e7d232dba8ea
SHA5123b754f6fde031d3a00797e0c5c609d9c2c49648459113967f922a2fc1e9a9161934e62831dd0ec0523d4c5a20a6dcf1d180430ed8682b0aa13d94f2e493b10f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD54d11353e86988f86263c2862e8742fb4
SHA16e4ec04e4af52a3df1bfbe74ae2b623a6f8a5369
SHA256a6c7010b968480676d7f09f37f9089156ea58bef41b08e9149eb04caaebd014c
SHA512f69878990b3c590f29f8ce5cf247da417cec3e1f4201dcdbbcec5e4806ccf623216ed0aea1b1d0e87c960949e2ae1aebda8801aed78e0883915343d964b604e2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.3MB
MD5ef83fdcec42fb41d16f59b1e5ee9b37d
SHA13ddba15f1e5f6a4c4b64d9d51355551ebfefa020
SHA25618f4089ead25f86ffc0bee8e9bbeff06810bae24df44ae3cbb90ea4a0066524e
SHA5125340eb55a713e677dc6b7125116a0cf41ee01eac6bcdfe53531a6c11b1dd41d91e6ef7232993d82c06e060498d807006fb82d0a9761d4951bdb5ceb80d389d93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.6MB
MD530eb849a65128b71e2c98ef0701b0255
SHA18e037b8a6099f272ba6511181f4239fcc3ee860c
SHA256faa4f2372cad3c5d211c6a15f3c4cb88cefaca14cab1d92e14b526182b079b1b
SHA512d34ab14c266acf3b4fc78edbc23eb8ed3f9b06faf637f3007e7d032c294019f65696688e2e66660e82f48392cbba92f73268f54a72eadd0a5bd994994de1d3d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.6MB
MD5761b9a84b82b2ee99d4bd149bb850900
SHA12b901d56f71161b1143be9fc6780f02fe5f776e3
SHA2568e0837c5ef2d0f216f5b1e6ded5349d79fef4343f5c12cdd8182a0a1931a2f8b
SHA5125245718a8692d23264ccf9a2a1e11e8bd1fc8c42ec1c7d3f650693d5b6572a072ea8a7f6657537c8619d33720205190b51f1c5ce289dffba917d606a90b3b007