Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
07/09/2024, 11:17
240907-ndvx2s1gra 1007/09/2024, 10:21
240907-mdzqkayhpb 1007/09/2024, 10:21
240907-mdq4esyfnl 1005/09/2024, 22:04
240905-1y2bsa1clp 1005/09/2024, 21:37
240905-1gl6ja1bjb 1016/08/2024, 00:38
240816-azcrpsvdqe 1016/08/2024, 00:13
240816-ah5fdsyapm 1016/08/2024, 00:04
240816-ac4a5sxglk 1015/08/2024, 01:57
240815-cc95ssydlb 10Analysis
-
max time kernel
413s -
max time network
609s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
Downloaders.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win10v2004-20240802-en
General
-
Target
New Text Document mod.exe
-
Size
8KB
-
MD5
69994ff2f00eeca9335ccd502198e05b
-
SHA1
b13a15a5bea65b711b835ce8eccd2a699a99cead
-
SHA256
2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
-
SHA512
ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
SSDEEP
96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Password: )NYyffR0 1 - Email To:
[email protected]
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1604
127.0.0.1:22253
eu-central-7075.packetriot.net:6606
eu-central-7075.packetriot.net:7707
eu-central-7075.packetriot.net:8808
eu-central-7075.packetriot.net:1604
eu-central-7075.packetriot.net:22253
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
amadey
4.41
cd33f9
http://193.176.158.185
-
install_dir
fed0c9a4d3
-
install_file
Hkbsse.exe
-
strings_key
a2163aef710017f5548e7e730af53cca
-
url_paths
/B0kf3CbAbR/index.php
Extracted
redline
185.215.113.9:12617
Extracted
redline
kir
147.45.44.73:6282
Extracted
lumma
https://bassizcellskz.shop/api
https://writerospzm.shop/api
https://deallerospfosu.shop/api
https://languagedscie.shop/api
https://complaintsipzzx.shop/api
https://quialitsuzoxm.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral2/files/0x001000000002351c-300.dat family_redline behavioral2/memory/4352-307-0x00000000006D0000-0x0000000000722000-memory.dmp family_redline behavioral2/files/0x000b0000000235d4-1488.dat family_redline behavioral2/memory/1324-1493-0x00000000005C0000-0x0000000000612000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000c0000000235d0-1478.dat family_sectoprat behavioral2/memory/6892-1483-0x0000000000010000-0x00000000000D6000-memory.dmp family_sectoprat -
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 2 IoCs
resource yara_rule behavioral2/memory/2936-52-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral2/memory/6128-412-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x00090000000234c3-146.dat family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4884 powershell.exe 5940 powershell.exe 448 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation request.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation asusns.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation stub.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation build2.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation regasm.exe -
Executes dropped EXE 43 IoCs
pid Process 4192 robotic.exe 2952 asusns.exe 2936 asusns.exe 3164 stub.exe 3912 build2.exe 3672 keylogger.exe 4840 svchost.exe 4812 networks_profile.exe 2832 networks_profile.exe 3672 backdoor.exe 2916 wahost.exe 924 regasm.exe 4352 cookie250.exe 4984 sahost.exe 5160 Hkbsse.exe 5560 wahost.exe 6128 regasm.exe 5268 out_test_sig.exe 3508 TTF.exe 5252 T9.exe 5968 Hkbsse.exe 6080 c7.exe 5028 mservice64.exe 3172 T7.exe 5868 nano.exe 4316 request.exe 5204 msvcservice.exe 6444 1111.exe 5012 Hkbsse.exe 1692 msvcservice.exe 2356 Identifications.exe 7084 Hkbsse.exe 6984 msvcservice.exe 2644 Hkbsse.exe 2692 msvcservice.exe 6892 authenticator.exe 1324 exec.exe 6240 U.exe 5876 WE.exe 5960 Hkbsse.exe 4372 msvcservice.exe 4712 66b5d9d3adbaa_defaultr.exe 5392 66af4e35e761b_doz.exe -
Loads dropped DLL 13 IoCs
pid Process 2832 networks_profile.exe 2832 networks_profile.exe 2832 networks_profile.exe 2832 networks_profile.exe 2832 networks_profile.exe 2832 networks_profile.exe 4984 sahost.exe 4984 sahost.exe 4984 sahost.exe 4984 sahost.exe 4984 sahost.exe 4984 sahost.exe 4984 sahost.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asusns.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wahost.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wahost.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wahost.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asusns.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asusns.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msvcservice = "C:\\Users\\Admin\\msvcservice.exe" msvcservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msvcservice = "C:\\Users\\Admin\\msvcservice.exe" msvcservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msvcservice = "C:\\Users\\Admin\\msvcservice.exe" msvcservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msvcservice = "C:\\Users\\Admin\\msvcservice.exe" request.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Service = "C:\\Program Files (x86)\\DPI Service\\dpisv.exe" nano.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msvcservice = "C:\\Users\\Admin\\msvcservice.exe" msvcservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msvcservice = "C:\\Users\\Admin\\msvcservice.exe" msvcservice.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA nano.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 432 pastebin.com 433 pastebin.com 81 raw.githubusercontent.com 82 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 57 checkip.dyndns.org 174 ip-api.io 175 ip-api.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4984 sahost.exe 6616 wab.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2952 set thread context of 2936 2952 asusns.exe 109 PID 2916 set thread context of 5560 2916 wahost.exe 179 PID 924 set thread context of 6128 924 regasm.exe 185 PID 3508 set thread context of 5936 3508 TTF.exe 191 PID 3172 set thread context of 224 3172 T7.exe 199 PID 4984 set thread context of 6616 4984 sahost.exe 255 PID 5252 set thread context of 6636 5252 T9.exe 256 PID 5876 set thread context of 5984 5876 WE.exe 292 PID 6240 set thread context of 2008 6240 U.exe 294 PID 4712 set thread context of 5704 4712 66b5d9d3adbaa_defaultr.exe 315 PID 5392 set thread context of 1256 5392 66af4e35e761b_doz.exe 317 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\DPI Service\dpisv.exe nano.exe File created C:\Program Files (x86)\DPI Service\dpisv.exe nano.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Hkbsse.job build2.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x00080000000234cc-207.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 41 IoCs
pid pid_target Process procid_target 2516 3912 WerFault.exe 132 1264 3912 WerFault.exe 132 4812 3912 WerFault.exe 132 4988 3912 WerFault.exe 132 2516 3912 WerFault.exe 132 2240 3912 WerFault.exe 132 4436 3912 WerFault.exe 132 2240 3912 WerFault.exe 132 4632 3912 WerFault.exe 132 5212 3912 WerFault.exe 132 5904 6128 WerFault.exe 185 2836 5160 WerFault.exe 174 6736 5160 WerFault.exe 174 6820 5160 WerFault.exe 174 2336 5160 WerFault.exe 174 2564 5160 WerFault.exe 174 1436 5160 WerFault.exe 174 6188 5160 WerFault.exe 174 5556 5160 WerFault.exe 174 1692 5160 WerFault.exe 174 6568 5968 WerFault.exe 192 6572 5160 WerFault.exe 174 6696 5160 WerFault.exe 174 5224 5012 WerFault.exe 252 4788 7084 WerFault.exe 262 3804 5160 WerFault.exe 174 224 2644 WerFault.exe 279 7144 5160 WerFault.exe 174 1708 5160 WerFault.exe 174 2916 5160 WerFault.exe 174 1404 5960 WerFault.exe 296 7140 6496 WerFault.exe 318 5980 4260 WerFault.exe 328 5348 5160 WerFault.exe 174 1896 5160 WerFault.exe 174 4924 4144 WerFault.exe 343 1344 5160 WerFault.exe 174 4960 5160 WerFault.exe 174 6488 232 WerFault.exe 370 5492 7124 WerFault.exe 365 3656 5160 WerFault.exe 174 -
System Location Discovery: System Language Discovery 1 TTPs 58 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asusns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nano.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66af4e35e761b_doz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cookie250.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language request.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msvcservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wahost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language out_test_sig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asusns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backdoor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TTF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msvcservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msvcservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msvcservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mservice64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msvcservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wahost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66b5d9d3adbaa_defaultr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sahost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language authenticator.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 720 netsh.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1111.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1111.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 3460 timeout.exe 6172 timeout.exe 6908 timeout.exe 6396 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 6304 systeminfo.exe -
Modifies registry class 32 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1226833921" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "10" msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 14002e80922b16d365937a46956b92703aca08af0000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202020202 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\SniffedFolderType = "Documents" msedge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 cookie250.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 cookie250.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 New Text Document mod.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 New Text Document mod.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 808 schtasks.exe 6008 schtasks.exe 5188 schtasks.exe 6124 schtasks.exe 5032 schtasks.exe 708 schtasks.exe 3640 schtasks.exe 1816 schtasks.exe 5424 schtasks.exe 6464 schtasks.exe 2268 schtasks.exe 5544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4192 robotic.exe 4192 robotic.exe 2936 asusns.exe 2936 asusns.exe 4884 powershell.exe 4884 powershell.exe 4884 powershell.exe 4784 msedge.exe 4784 msedge.exe 3388 msedge.exe 3388 msedge.exe 1304 identity_helper.exe 1304 identity_helper.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 3164 stub.exe 2936 asusns.exe 2936 asusns.exe 2916 wahost.exe 2916 wahost.exe 2916 wahost.exe 5560 wahost.exe 5560 wahost.exe 924 regasm.exe 924 regasm.exe 924 regasm.exe 5940 powershell.exe 5940 powershell.exe 924 regasm.exe 6128 regasm.exe 6128 regasm.exe 5940 powershell.exe 5860 msedge.exe 5860 msedge.exe 5868 nano.exe 5868 nano.exe 5868 nano.exe 5868 nano.exe 5868 nano.exe 5868 nano.exe 5868 nano.exe 5868 nano.exe 5936 RegAsm.exe 5936 RegAsm.exe 5936 RegAsm.exe 5936 RegAsm.exe 5936 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5868 nano.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4984 sahost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4972 New Text Document mod.exe Token: SeDebugPrivilege 4192 robotic.exe Token: SeBackupPrivilege 4192 robotic.exe Token: SeSecurityPrivilege 4192 robotic.exe Token: SeSecurityPrivilege 4192 robotic.exe Token: SeSecurityPrivilege 4192 robotic.exe Token: SeSecurityPrivilege 4192 robotic.exe Token: SeDebugPrivilege 4884 powershell.exe Token: SeDebugPrivilege 2936 asusns.exe Token: SeDebugPrivilege 3164 stub.exe Token: SeDebugPrivilege 4840 svchost.exe Token: SeDebugPrivilege 4840 svchost.exe Token: SeDebugPrivilege 2916 wahost.exe Token: SeDebugPrivilege 5560 wahost.exe Token: SeDebugPrivilege 924 regasm.exe Token: SeDebugPrivilege 5940 powershell.exe Token: SeDebugPrivilege 6128 regasm.exe Token: SeDebugPrivilege 3508 TTF.exe Token: SeDebugPrivilege 5252 T9.exe Token: SeDebugPrivilege 5936 RegAsm.exe Token: SeBackupPrivilege 5936 RegAsm.exe Token: SeSecurityPrivilege 5936 RegAsm.exe Token: SeSecurityPrivilege 5936 RegAsm.exe Token: SeSecurityPrivilege 5936 RegAsm.exe Token: SeSecurityPrivilege 5936 RegAsm.exe Token: SeDebugPrivilege 3172 T7.exe Token: SeDebugPrivilege 5028 mservice64.exe Token: SeBackupPrivilege 5028 mservice64.exe Token: SeSecurityPrivilege 5028 mservice64.exe Token: SeSecurityPrivilege 5028 mservice64.exe Token: SeSecurityPrivilege 5028 mservice64.exe Token: SeSecurityPrivilege 5028 mservice64.exe Token: SeDebugPrivilege 5868 nano.exe Token: SeDebugPrivilege 2648 firefox.exe Token: SeDebugPrivilege 2648 firefox.exe Token: SeDebugPrivilege 6636 RegAsm.exe Token: SeBackupPrivilege 6636 RegAsm.exe Token: SeSecurityPrivilege 6636 RegAsm.exe Token: SeSecurityPrivilege 6636 RegAsm.exe Token: SeSecurityPrivilege 6636 RegAsm.exe Token: SeSecurityPrivilege 6636 RegAsm.exe Token: SeDebugPrivilege 448 powershell.exe Token: SeDebugPrivilege 6844 powershell.exe Token: SeIncreaseQuotaPrivilege 6844 powershell.exe Token: SeSecurityPrivilege 6844 powershell.exe Token: SeTakeOwnershipPrivilege 6844 powershell.exe Token: SeLoadDriverPrivilege 6844 powershell.exe Token: SeSystemProfilePrivilege 6844 powershell.exe Token: SeSystemtimePrivilege 6844 powershell.exe Token: SeProfSingleProcessPrivilege 6844 powershell.exe Token: SeIncBasePriorityPrivilege 6844 powershell.exe Token: SeCreatePagefilePrivilege 6844 powershell.exe Token: SeBackupPrivilege 6844 powershell.exe Token: SeRestorePrivilege 6844 powershell.exe Token: SeShutdownPrivilege 6844 powershell.exe Token: SeDebugPrivilege 6844 powershell.exe Token: SeSystemEnvironmentPrivilege 6844 powershell.exe Token: SeRemoteShutdownPrivilege 6844 powershell.exe Token: SeUndockPrivilege 6844 powershell.exe Token: SeManageVolumePrivilege 6844 powershell.exe Token: 33 6844 powershell.exe Token: 34 6844 powershell.exe Token: 35 6844 powershell.exe Token: 36 6844 powershell.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3912 build2.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe 2648 firefox.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5860 msedge.exe 2648 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4192 4972 New Text Document mod.exe 101 PID 4972 wrote to memory of 4192 4972 New Text Document mod.exe 101 PID 4972 wrote to memory of 2952 4972 New Text Document mod.exe 103 PID 4972 wrote to memory of 2952 4972 New Text Document mod.exe 103 PID 4972 wrote to memory of 2952 4972 New Text Document mod.exe 103 PID 2952 wrote to memory of 4884 2952 asusns.exe 105 PID 2952 wrote to memory of 4884 2952 asusns.exe 105 PID 2952 wrote to memory of 4884 2952 asusns.exe 105 PID 2952 wrote to memory of 1816 2952 asusns.exe 107 PID 2952 wrote to memory of 1816 2952 asusns.exe 107 PID 2952 wrote to memory of 1816 2952 asusns.exe 107 PID 2952 wrote to memory of 2936 2952 asusns.exe 109 PID 2952 wrote to memory of 2936 2952 asusns.exe 109 PID 2952 wrote to memory of 2936 2952 asusns.exe 109 PID 2952 wrote to memory of 2936 2952 asusns.exe 109 PID 2952 wrote to memory of 2936 2952 asusns.exe 109 PID 2952 wrote to memory of 2936 2952 asusns.exe 109 PID 2952 wrote to memory of 2936 2952 asusns.exe 109 PID 2952 wrote to memory of 2936 2952 asusns.exe 109 PID 4972 wrote to memory of 3388 4972 New Text Document mod.exe 110 PID 4972 wrote to memory of 3388 4972 New Text Document mod.exe 110 PID 3388 wrote to memory of 3628 3388 msedge.exe 111 PID 3388 wrote to memory of 3628 3388 msedge.exe 111 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 3192 3388 msedge.exe 112 PID 3388 wrote to memory of 4784 3388 msedge.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wahost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wahost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\a\robotic.exe"C:\Users\Admin\AppData\Local\Temp\a\robotic.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
C:\Users\Admin\AppData\Local\Temp\a\asusns.exe"C:\Users\Admin\AppData\Local\Temp\a\asusns.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OKmzKrla.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OKmzKrla" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7421.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\a\asusns.exe"C:\Users\Admin\AppData\Local\Temp\a\asusns.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5f1346f8,0x7ffe5f134708,0x7ffe5f1347183⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:23⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:83⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:13⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:13⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:83⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:13⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:13⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:13⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2060 /prefetch:13⤵PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:13⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2128,16526974113973337826,7061749327615539854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4472 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5860
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\stub.exe"C:\Users\Admin\AppData\Local\Temp\a\stub.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
PID:4992 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC147.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
PID:4260 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3460
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\build2.exe"C:\Users\Admin\AppData\Local\Temp\a\build2.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 7563⤵
- Program crash
PID:2516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 8163⤵
- Program crash
PID:1264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 7723⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 7723⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 9123⤵
- Program crash
PID:2516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 9523⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 11203⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 11643⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 12043⤵
- Program crash
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 5564⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 5564⤵
- Program crash
PID:6736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 6084⤵
- Program crash
PID:6820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 8244⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 8364⤵
- Program crash
PID:2564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 8724⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 9364⤵
- Program crash
PID:6188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 9444⤵
- Program crash
PID:5556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 9604⤵
- Program crash
PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 11124⤵
- Program crash
PID:6572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 13484⤵
- Program crash
PID:6696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 8884⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 13364⤵
- Program crash
PID:7144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 13724⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 13484⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 11324⤵
- Program crash
PID:5348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 9044⤵
- Program crash
PID:1896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 10724⤵
- Program crash
PID:1344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 8884⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 13284⤵
- Program crash
PID:3656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 8683⤵
- Program crash
PID:5212
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\keylogger.exe"C:\Users\Admin\AppData\Local\Temp\a\keylogger.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\a\networks_profile.exe"C:\Users\Admin\AppData\Local\Temp\a\networks_profile.exe"2⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\a\networks_profile.exe"C:\Users\Admin\AppData\Local\Temp\a\networks_profile.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2832 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"4⤵PID:704
-
-
C:\Windows\SYSTEM32\netsh.exenetsh wlan show profiles4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\a\backdoor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\a\wahost.exe"C:\Users\Admin\AppData\Local\Temp\a\wahost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\a\wahost.exe"C:\Users\Admin\AppData\Local\Temp\a\wahost.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5560
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\regasm.exe"C:\Users\Admin\AppData\Local\Temp\a\regasm.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eVoVlc.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5940
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eVoVlc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4637.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6008
-
-
C:\Users\Admin\AppData\Local\Temp\a\regasm.exe"C:\Users\Admin\AppData\Local\Temp\a\regasm.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6128 -s 15884⤵
- Program crash
PID:5904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\cookie250.exe"C:\Users\Admin\AppData\Local\Temp\a\cookie250.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\a\sahost.exe"C:\Users\Admin\AppData\Local\Temp\a\sahost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4984 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Users\Admin\AppData\Local\Temp\a\sahost.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6616
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\out_test_sig.exe"C:\Users\Admin\AppData\Local\Temp\a\out_test_sig.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5268 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Microsoft\Windows\hyper-v.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:6304
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-CimInstance -Class Win32_ComputerSystem3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6844
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\TTF.exe"C:\Users\Admin\AppData\Local\Temp\a\TTF.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5936
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\T9.exe"C:\Users\Admin\AppData\Local\Temp\a\T9.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6636
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\c7.exe"C:\Users\Admin\AppData\Local\Temp\a\c7.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6080
-
-
C:\Users\Admin\AppData\Local\Temp\a\mservice64.exe"C:\Users\Admin\AppData\Local\Temp\a\mservice64.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\a\T7.exe"C:\Users\Admin\AppData\Local\Temp\a\T7.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\nano.exe"C:\Users\Admin\AppData\Local\Temp\a\nano.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5868
-
-
C:\Users\Admin\AppData\Local\Temp\a\request.exe"C:\Users\Admin\AppData\Local\Temp\a\request.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5424
-
-
C:\Users\Admin\msvcservice.exe"C:\Users\Admin\msvcservice.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5204 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\1111.exe"C:\Users\Admin\AppData\Local\Temp\a\1111.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6444
-
-
C:\Users\Admin\AppData\Local\Temp\a\Identifications.exe"C:\Users\Admin\AppData\Local\Temp\a\Identifications.exe"2⤵
- Executes dropped EXE
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\a\authenticator.exe"C:\Users\Admin\AppData\Local\Temp\a\authenticator.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6892
-
-
C:\Users\Admin\AppData\Local\Temp\a\exec.exe"C:\Users\Admin\AppData\Local\Temp\a\exec.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\a\U.exe"C:\Users\Admin\AppData\Local\Temp\a\U.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\WE.exe"C:\Users\Admin\AppData\Local\Temp\a\WE.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5984
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\66b5d9d3adbaa_defaultr.exe"C:\Users\Admin\AppData\Local\Temp\a\66b5d9d3adbaa_defaultr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5704 -
C:\ProgramData\FCFBFHIEBK.exe"C:\ProgramData\FCFBFHIEBK.exe"4⤵PID:4244
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:3284
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:6100
-
-
-
C:\ProgramData\HDBGDHDAEC.exe"C:\ProgramData\HDBGDHDAEC.exe"4⤵PID:3728
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:4412
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:5500
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HCAKFBGCBFHI" & exit4⤵PID:6332
-
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- Delays execution with timeout.exe
PID:6172
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\66af4e35e761b_doz.exe"C:\Users\Admin\AppData\Local\Temp\a\66af4e35e761b_doz.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1256
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & rd /s /q "C:\ProgramData\KKKJEBAAECBG" & exit4⤵PID:3816
-
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- Delays execution with timeout.exe
PID:6908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\66b5b75106ac6_stealc.exe"C:\Users\Admin\AppData\Local\Temp\a\66b5b75106ac6_stealc.exe"2⤵PID:5888
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 12244⤵
- Program crash
PID:5980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\66b0ee142cf8f_PhotosExifEditor.exe"C:\Users\Admin\AppData\Local\Temp\a\66b0ee142cf8f_PhotosExifEditor.exe"2⤵PID:5832
-
-
C:\Users\Admin\AppData\Local\Temp\a\66b837290469c_vidar.exe"C:\Users\Admin\AppData\Local\Temp\a\66b837290469c_vidar.exe"2⤵PID:6224
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1080
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\66af531b832ee_main.exe"C:\Users\Admin\AppData\Local\Temp\a\66af531b832ee_main.exe"2⤵PID:5324
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:4004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & rd /s /q "C:\ProgramData\AKEGDAKEHJDH" & exit4⤵PID:1768
-
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- Delays execution with timeout.exe
PID:6396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\66b4af430a0a1_files.exe"C:\Users\Admin\AppData\Local\Temp\a\66b4af430a0a1_files.exe"2⤵PID:5892
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:6312
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\66b85f47d1f63_stealc.exe"C:\Users\Admin\AppData\Local\Temp\a\66b85f47d1f63_stealc.exe"2⤵PID:2836
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:7124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7124 -s 12404⤵
- Program crash
PID:5492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\66b74da9b163e_1234.exe"C:\Users\Admin\AppData\Local\Temp\a\66b74da9b163e_1234.exe"2⤵PID:2948
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:3164
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\66b5ace3a06b0_dozkey.exe"C:\Users\Admin\AppData\Local\Temp\a\66b5ace3a06b0_dozkey.exe"2⤵PID:6812
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:5888
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\66b331997e05e_main21.exe"C:\Users\Admin\AppData\Local\Temp\a\66b331997e05e_main21.exe"2⤵PID:6636
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:4484
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:2688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:3972
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3912 -ip 39121⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3912 -ip 39121⤵PID:364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3912 -ip 39121⤵PID:1200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3912 -ip 39121⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3912 -ip 39121⤵PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3912 -ip 39121⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3912 -ip 39121⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3912 -ip 39121⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3912 -ip 39121⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3912 -ip 39121⤵PID:5176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6128 -ip 61281⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe1⤵
- Executes dropped EXE
PID:5968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5968 -s 4442⤵
- Program crash
PID:6568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵PID:972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe5f1346f8,0x7ffe5f134708,0x7ffe5f1347182⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵PID:5176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffe5f1346f8,0x7ffe5f134708,0x7ffe5f1347182⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,13522088629630615918,8117943713623427073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵PID:2004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:4512
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1716 -prefMapHandle 1708 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd43e41b-2d4d-487d-82d2-c856ae337b39} 2648 "\\.\pipe\gecko-crash-server-pipe.2648" gpu3⤵PID:2832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2384 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {77cfac36-6eb4-4238-baca-6cdce0049443} 2648 "\\.\pipe\gecko-crash-server-pipe.2648" socket3⤵PID:4428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2840 -childID 1 -isForBrowser -prefsHandle 3124 -prefMapHandle 3112 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e660bc0-bd3d-485e-b723-6645dec8498f} 2648 "\\.\pipe\gecko-crash-server-pipe.2648" tab3⤵PID:4876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1864 -childID 2 -isForBrowser -prefsHandle 3604 -prefMapHandle 3104 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a6451d9-36ea-4312-aa3f-1db80265dc7f} 2648 "\\.\pipe\gecko-crash-server-pipe.2648" tab3⤵PID:6000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3608 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4240 -prefMapHandle 4236 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af62cc05-2708-4ee2-85b7-768203c080bc} 2648 "\\.\pipe\gecko-crash-server-pipe.2648" utility3⤵
- Checks processor information in registry
PID:6268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1896 -childID 3 -isForBrowser -prefsHandle 5432 -prefMapHandle 5428 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3cef8ed5-1ba0-4d4a-a1b9-9cd3c6500a99} 2648 "\\.\pipe\gecko-crash-server-pipe.2648" tab3⤵PID:5004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5560 -childID 4 -isForBrowser -prefsHandle 5568 -prefMapHandle 5572 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f5a15a44-5c03-484a-974e-656e75c8cf57} 2648 "\\.\pipe\gecko-crash-server-pipe.2648" tab3⤵PID:4884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5840 -childID 5 -isForBrowser -prefsHandle 5760 -prefMapHandle 5764 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07d4095a-e443-4b60-b25a-6af15576a59e} 2648 "\\.\pipe\gecko-crash-server-pipe.2648" tab3⤵PID:1180
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6060 -childID 6 -isForBrowser -prefsHandle 6064 -prefMapHandle 6048 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f7939f5-8110-4005-8d1f-9387753cdc4c} 2648 "\\.\pipe\gecko-crash-server-pipe.2648" tab3⤵PID:6932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5160 -ip 51601⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5160 -ip 51601⤵PID:6660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5160 -ip 51601⤵PID:6804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5160 -ip 51601⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5160 -ip 51601⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5160 -ip 51601⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5160 -ip 51601⤵PID:6204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5160 -ip 51601⤵PID:2552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5160 -ip 51601⤵PID:6332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5968 -ip 59681⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5160 -ip 51601⤵PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5160 -ip 51601⤵PID:6652
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe1⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 4402⤵
- Program crash
PID:5224
-
-
C:\Users\Admin\msvcservice.exeC:\Users\Admin\msvcservice.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5012 -ip 50121⤵PID:5908
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe1⤵
- Executes dropped EXE
PID:7084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7084 -s 4442⤵
- Program crash
PID:4788
-
-
C:\Users\Admin\msvcservice.exeC:\Users\Admin\msvcservice.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6984 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 7084 -ip 70841⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5160 -ip 51601⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 4482⤵
- Program crash
PID:224
-
-
C:\Users\Admin\msvcservice.exeC:\Users\Admin\msvcservice.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2644 -ip 26441⤵PID:6136
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe1⤵
- Executes dropped EXE
PID:5960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5960 -s 4402⤵
- Program crash
PID:1404
-
-
C:\Users\Admin\msvcservice.exeC:\Users\Admin\msvcservice.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5160 -ip 51601⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5160 -ip 51601⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5160 -ip 51601⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5960 -ip 59601⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe1⤵PID:6496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 4402⤵
- Program crash
PID:7140
-
-
C:\Users\Admin\msvcservice.exeC:\Users\Admin\msvcservice.exe1⤵PID:6340
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 6496 -ip 64961⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4260 -ip 42601⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe1⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 1842⤵
- Program crash
PID:4924
-
-
C:\Users\Admin\msvcservice.exeC:\Users\Admin\msvcservice.exe1⤵PID:616
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5160 -ip 51601⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5160 -ip 51601⤵PID:5256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4144 -ip 41441⤵PID:5720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5160 -ip 51601⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5160 -ip 51601⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe1⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 4482⤵
- Program crash
PID:6488
-
-
C:\Users\Admin\msvcservice.exeC:\Users\Admin\msvcservice.exe1⤵PID:4772
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:5544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 232 -ip 2321⤵PID:7028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 7124 -ip 71241⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5160 -ip 51601⤵PID:5232
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:2560
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:5744
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5757849bf7da96165dae5464a16da6059
SHA1fbded5ca56d2a4c3ef62bf5d54b282f225f3e5bc
SHA256b40a4270e62223444bf215192a8e90148b7d0ab5cd7f953bc2a559e2d73ea6aa
SHA51236bf3762c14de11cdf67fea73e6a6bb76b913a794a62913d795218529a9756ffa2704efc7d9090d145e8fda9d5e5bde25132e255b32895fd9334de8de6a1808e
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
201KB
MD5151992a5dbd1f0c6adc8b7d97b33bd32
SHA16c4645bf70db9193a5af34bd9e5783f7cc1ca468
SHA256010f727664376b681591a8f9588e54f8a0a6741371ca33edc23aa53cd5e26eeb
SHA512121e7f408eb5e564c0d45263ead08e94e64e49bb8139f981954f1bb2524e99eca53b496ad06f61f1c63c576c9f6aa68960bf5a8d0f08a074ce7f4da75ad8c477
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD53cfabadfcb05a77b204fe1a6b09a5c90
SHA1f106b5ed22265e64bc61dc5cf1e2d33ed12ec18d
SHA256693617c470d7472e751d872341061cfb663f22ee95bdb42f9db01f02cb90df9c
SHA512d5502023a17213919e2e991f5ba2d0d2c08223fd489d876a47a37239b637d03ace9cb9b92deb71460ae4030194ca49ce9e9752e0bf2ccbcd297dc5afe62a4e7b
-
Filesize
278KB
MD59cf14b0c62311b27ace3c25c21a722ff
SHA14037b8cee08d09db0fce2d485ca3a83ca3f4871a
SHA2566419a4d08ba5c07e14c2d75b14ea8da5f2f340d4747e498fe515685c48542b33
SHA5126842555ee9f937c347685d6d15ed6eaf839911dc64de3f9241889e8c721714ba1c24a4104a39462ea052ae847c87c19df0b56500cc3fb2bf72163525bde4ea3c
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
522B
MD58334a471a4b492ece225b471b8ad2fc8
SHA11cb24640f32d23e8f7800bd0511b7b9c3011d992
SHA2565612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169
SHA51256ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36
-
Filesize
847B
MD5f8ec7f563d06ccddddf6c96b8957e5c8
SHA173bdc49dcead32f8c29168645a0f080084132252
SHA25638ef57aec780edd2c8dab614a85ce87351188fce5896ffebc9f69328df2056ed
SHA5128830821ac9edb4cdf4d8a3d7bc30433987ae4c158cf81b705654f54aaeba366c5fa3509981aceae21e193dd4483f03b9d449bc0a32545927d3ca94b0f9367684
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD5c075495049be81b9ce2815c1bc009b36
SHA11befacff91d652f8376955358af77de55a2bc7fc
SHA256f556c7856e80b0fdd93f4c0a6ee721a26722c54cbd32a8133cbda0e8dd91babd
SHA512138e988324533e3902abac1676c6076d1ac2db868e5f26eb47736e9fdf572da11b3db798f61660f3eed582f89f3607d8b7192bdb2f959bab96eaa2fd410ec307
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5c70a8ecd4662bfe47df2b736616e643f
SHA1eb250144d05537e68d87e1a1d82d134affd6cdca
SHA2564ddd21e25060fb2460ab20eb8859d95013974961a2bf7c0da96a2540a5bbf8db
SHA512f669b606027a3af176c5cf67694c15e9db71c046f6d4be123384264adcdf093a29fd9f4a61a760d4b68bacf7dfd7b25e149903f54e97443381cc8dc22cdccea2
-
Filesize
5KB
MD5d78965568a1c0ec76195fa3a227e521f
SHA1224395c80a78a13c577053ad4be3dcbfb5190194
SHA2562cb31bc5aa7deb1874e96d7dbbdf30e6cc0794b80369949b2990b662413878d9
SHA5120f9f380bb0ca11a0737da1225822009caca220dee7f23f2c1d7a18efc6e5a5bf0bdd2cd4c8f979a8e5c10c77254cc1a843efe5c9aff6a8707c166193813e3afc
-
Filesize
6KB
MD5fb4c4abd781d4dc0aef8f2e836bc081d
SHA1ede44543f7b53c8692418be6c94f1c8e7d604079
SHA256bd615b199f069128a73bf5fd0a36728223e0ae0d281a6fef39bb2d82270e1ac2
SHA512e8187f5fdc6026a07fe4e550758726013f7c551c71496da44c96c47dce8d4fb0024ead94f5514ac24c53d9792a31625e08dba8794552eb19eaa87b7ba37a1d4a
-
Filesize
6KB
MD5d5bb69847945b336b55def5141375efe
SHA103c061da98915d005d343f260623409aeacaab3d
SHA256c1f0350a99fee05e63bd01ae83444267749f7721fb0cb19c9fcc718a55df1b1d
SHA512046874cea02832cb2eee6351180d6652618db77424a26e4031d40a3948e333fa315e855c6b267fb8cf806011d37f128ba32608cd3afa2dbc4d8b8f3975d57fef
-
Filesize
706B
MD59b299c4e9c0db0cd878a4cd5a9de7dec
SHA10e39737b61d4cfe162b3b0a1aee882f9d0b8c99e
SHA256fae21b25b981a8e9e61c185b4854eacece8a958a3c2f1de6dd5c62ecfbb05257
SHA512af305659f661b863e58129491107c954a4df83099b9f484c6d6b7a5152433611ffc43c42c0e21c2cd7cbcefc70107fa48cc1ba03b8e35cd3da672d5d6e0706da
-
Filesize
706B
MD5cd323651bd33da0b01e87acd07ba6d9b
SHA1595ec73ef771c1292c7a10f07b6b7a48f89b4a3f
SHA25643f26e5fa6cb95d7afdb5374d1fa9de58d51c31842b9403c718226c489a2376a
SHA51248173ae01441a48cf2a70bbc55fcb6c0959c7a2654556dddda9b272a2bf9ce75c316a69cae1e1d46bedd5c491e8b6eaf4318c26082994c3194978a7fce34f708
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50bba93c1c8904b9436c44cc9e7a50599
SHA142903e8e4ad73509b872fa9731bdbe0082a71206
SHA256ab09b33a5764ee30dc9c396660c78e8c2443fadec04559d4da15d939ae36962d
SHA512e3f6567fb6b115462ec8233f20b5f366f2cd718c045430f436d1a3c6490931b9a7e4493192cd8255bcee7c1dbdb352d014bfd1aecfb2e6f57a77cbd2b716f87b
-
Filesize
18KB
MD5301b99c347d0f9940a91dd13edf42285
SHA144d499d6fce1ca89a52719f6d9f12a4472a29733
SHA2563404143725844bfcf72bda279dc95817efb2b1f45a9dcb330b1643edffd0cecc
SHA512b40da6ee7e93d7c8151fe8b8f466c20e9219788c15ba858589a58ea7114ecc7009c77dfa3e3cd486071d7f080a632a65acac330b79d867dc930a86b884e5c5e8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\activity-stream.discovery_stream.json
Filesize30KB
MD5f76a96054bbc141a56012de9df8f0286
SHA1329b86339482af9dbe66d1fd88fa4f32a16002de
SHA2568b2da82336da222248dd9fa8850f2950304d14bddb6c6f4eeb9ba193f4d7a924
SHA5120ecb2503e916b1c371bc6028d0880db06871d7db09e3838aff7fbdf5e7f054cb49af94b19603aa9878cae73703fa017c049c143402c6a5c0d3c3ebcc6c0709ab
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\cache2\entries\ABD634484EBC6043D0302B090BB04F2A504AE1E6
Filesize75KB
MD507df17ff89924063b2a039cea7deeb00
SHA1b032e9afad8a28a4de5b310642b75a85cc63d6c2
SHA256d9483aad0634dc19cfbf968f165f0e1ad0f9d3e55da281aded14ca1e74dff27f
SHA512d35b74f716eafe04807653c46c1344fca86595616442650ddcfeb0fc06eea5d098ff243100342347ce66aa5c845d4a87d9a019f55ea32a8627111602fc6dac2b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD5539d26425b6384a5a19b32adbedcf763
SHA134c11abd04a47e14eb80f7588d15636456850306
SHA256f29fb57c5535dac48b2ec4152c3d3b2425be20a9e4fdb533b7e33ec331b29447
SHA5128d721dae6be352597e9747c3770614092de61eaccac450d56f4c5eea19c38b039826267d21a4702abddf27bfe95a04d0d6ebe096600a7a5bb2790aa7721c6b68
-
Filesize
32KB
MD5fa4266923ec7cd9159220c81210aec4c
SHA1bdc5ec646c8b4f67da1586aeb8b5af49449589e8
SHA256edd21b99ba9d19d1033ff3c4644a306329586130077c903e6438ae1fbe515a76
SHA512d31337ed0f6fdeee25d43a64ee8fdcd162f22d4da440debf6355b9c6d038b5983a65da2d040cd50f7ae5174b01ae319f63531c65b2a574869ac9a48f52572c0f
-
Filesize
127KB
MD56a32dfc7984c55c4d2a0887d0fe955e5
SHA18714e7785848e3514b16cc85baa01131f23ee691
SHA2568a143e0c9c2f3adc847f4aef021e232339ced74636fce4de12b7e8c40fbf95df
SHA5124f8aec40e6ff64ffeb9092bf1c96d4a6c64249078093d63e3fad5afc1cd176b6c79696edc1cee22eea074663d9176dae90de1cb43e93c47666bba7191edd0057
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
94KB
MD518049f6811fc0f94547189a9e104f5d2
SHA1dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6
SHA256c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db
SHA51238fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7
-
Filesize
124KB
MD57322f8245b5c8551d67c337c0dc247c9
SHA15f4cb918133daa86631211ae7fa65f26c23fcc98
SHA2564fcf4c9c98b75a07a7779c52e1f7dff715ae8a2f8a34574e9dac66243fb86763
SHA51252748b59ce5d488d2a4438548963eb0f2808447c563916e2917d08e5f4aab275e4769c02b63012b3d2606fdb5a8baa9eb5942ba5c5e11b7678f5f4187b82b0c2
-
Filesize
78KB
MD5478abd499eefeba3e50cfc4ff50ec49d
SHA1fe1aae16b411a9c349b0ac1e490236d4d55b95b2
SHA256fdb14859efee35e105f21a64f7afdf50c399ffa0fa8b7fcc76dae4b345d946cb
SHA512475b8d533599991b4b8bfd27464b379d78e51c41f497e81698b4e7e871f82b5f6b2bfec70ec2c0a1a8842611c8c2591133eaef3f7fc4bc7625e18fc4189c914e
-
Filesize
763KB
MD5c6b38adf85add9f9a7ea0b67eea508b4
SHA123a398ffdae6047d9777919f7b6200dd2a132887
SHA25677479f65578cf9710981255a3ad5495d45f8367b2f43c2f0680fce0fed0e90fb
SHA512d6abc793a7b6cc6138b50305a8c1cad10fa1628ca01a2284d82222db9bd1569959b05bdf4581d433ff227438131e43eec98bf265e746b17e76b1c9e9e21d447d
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
4.3MB
MD51d5e4c20a20740f38f061bdf48aaca4f
SHA1de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0
SHA256f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366
SHA5129df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397
-
Filesize
28KB
MD5fed3dae56f7c9ea35d2e896fede29581
SHA1ae5b2ef114138c4d8a6479d6441967c170c5aa23
SHA256d56542143775d02c70ad713ac36f295d473329ef3ad7a2999811d12151512931
SHA5123128c57724b0609cfcaca430568d79b0e6abd13e5bba25295493191532dba24af062d4e0340d0ed68a885c24fbbf36b7a3d650add2f47f7c2364eab6a0b5faff
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.8MB
MD52055eb0fa5dfccef0c68146527b0c4f4
SHA19a04941b835e1f13d96a3b4fcd137038689105a3
SHA256da96b85bb04c797fd30df884ec895f8a03c7dc98c9e188733a4ee1d8754fec70
SHA5128aa28d3febc2c2aeeed19f75cb871ef5f5e5e105108b7f210c54dcf9c9aafb193a9287be99bacea3e713807a89fd9c8f637b45c849e2336e6397844187a643e4
-
Filesize
4.5MB
MD5c7904602501fb4a18a2ceb29d1c7748b
SHA1cf51727aab14549d8748ab60876b3915532b08be
SHA2560843b763880a4e1b559d29140afff5cd867bcada20eda6db2524d4e5045af114
SHA51270512f5498fb5f813bfcfb3383807f3beee8dfceb24156cfa9dab122baf2aa15681b0b9dbcd0e29537d07383656e08a6dd2d2b8328ec2c80488839ba66d08a13
-
Filesize
4.4MB
MD546bb5bf831f8b516b87078f35286a4d6
SHA14a6637b3ace0542d5629dfef7ad3b0b5e73e9c01
SHA256521d404952876e51d0cf3a4d0d69e30566406a3a129343d5e53d5d7274f4d3dc
SHA5129b8abf0478563a402edff57282c1be0475742f403c07d9b99ca5ff36a5fb7831d2af76bbef046dc9b2b1b084ea287b20040610c44e0ccb7251b9d6e9fb2fda19
-
Filesize
7.9MB
MD5677ad736788d93b76ca77717706a8176
SHA1e5ceecfa05f98c11f58b8844cba4e52850e11009
SHA2568ef1d24500ab75ee2ebde59ea01df3a168b41d9d7e987ae843c1188ec7dac49f
SHA512df2b84b37380ef2776d5f4d5179006e5ef0f318928fd040bea7ba4a88808bdf62220cddc3ce7406f30aac1e7ea019d1a994eda2c7fd23038ca0748e078db6700
-
Filesize
8.3MB
MD5305d50d93ffc87e36a9d7d0914f8c4c5
SHA154e1e8998810a96a038b5f0c7c8a4846335e778e
SHA25612df075fcaec366639ab37f203aa412540f351ee17e7f126a4a126e7a61c2a9b
SHA512ffadb7e34cf8360b062e62e51862c22716f16a42024dcfbadbe5e1c907704e9994e394915d74b04fe5a471892f16c9c4f07bac4d707eb188e009960866e2ab4b
-
Filesize
6.2MB
MD5f3d8c82810e55bc012bdeb2557ff13b9
SHA1f899ab6b698678aedc8b24a6d7599114479216fe
SHA256c4af46f2a357b68ce8e5830d9639e0c9212c61ae5d0fd1bb283812217a14ab72
SHA5123e93f06c4fcbe06a904144bb08ec876587b58626c80d9774c0282f67530d3cf0668a9da795899cdc618e6ace6e513b9cd82b7dafa4c09d4fdb0e9b2160dd4f7f
-
Filesize
6.1MB
MD51971d66193a4acc5be2af2c1d34c2d4d
SHA1e33f7bfb8aa73f1674e141590bfb823d0545312f
SHA2566ae1ebeb88e73be3fd5141deb9e85ed84203af1ef50cea7f2efc6be74816e52e
SHA5125e1d5b88035b183ac51dba94861bd95fc593c879cd6c5156b0e9e61c7af80aea8549ab623fa54ea7c33a60ce4843f7c0dfe9f834da00c7c885ee1bb7996416ed
-
Filesize
6.0MB
MD567d39f0cbbab44b99fffaf3a408b2088
SHA1ab84d55834c956a7904db0061a9fe145a6e9c783
SHA256e7ad5000fcab4b69737e7b206f7ea0fbeeb7f68443e983e924e2710b54c7e5d4
SHA512b5ef2c31e80527bf5715db45cb859d79b16ae4361657298173dd666290d14ce3f04e366ef203f00663964c815fa101ef4a42036669412c67ac4daa020f4faab4
-
Filesize
11.1MB
MD545c0d8bedd6bff145cbe1c3064f2cf56
SHA15a68f160bde8531f0b38ed8f9c6b19b7e615a905
SHA256b8a5ef9ea9fa588907a197db55c743559460190aa58b227db10d6be75d8bfe39
SHA5123963adecb4ee013b54c926328fe0d6576d291dcae0ead3f675c38ddb51b2747e0469179fa4903e3237fe2beea7079f67da377f3787b3bd4ddba8694102af0703
-
Filesize
5.9MB
MD53acb965ae22984ecfff23257cf1fb049
SHA1194d4c7a68bff966ce655b4e42ce74d388428438
SHA2560b937b6b47796295a7ad405daee481beb8ac1268e5b2121996f1c514378968da
SHA5129c87d73a84fd92daaf0ee3c0c8939569cafdd69eaaa110d1aff92b3a6f4bd8b8490a68bd147d9e3002e909921132c944250e51223a6a5c8ad55859a983220135
-
Filesize
9.3MB
MD5dd9a8bbd0b8038552cb57b07a56f0ae2
SHA10f4a5f36b7f29f9012f73595594c564b574df9ee
SHA256e603e36cae3f0fa9badbeaeff8fb0becb1ed444776892db76cd8d219e2ba92bd
SHA5121d215eae3e854b04e8fe4d2f3119c9308882f5c2f4125183ca21e034c7be6da0a6549aacb0880900e667cb2ee3b1a29aabef24a17bdec83e1a415038664b2b64
-
Filesize
7.0MB
MD5f90545447cc1a034b5808ed7fdf73091
SHA19bb93d17ff2aa79cd39ba9307f2f2dc907f854f9
SHA2564ff955e39fc6b4f0c0a715c3b87b95c47d61df9145e0071061a5070a5c87c855
SHA512c3c8670afb7b4bb4b9a2e787577a9dc3bf8564d0795fdb978090ecc97ec00db633303773a1843dceb4cd89a281c96a39cb5a7c231d87382989dff07536a95807
-
Filesize
9.2MB
MD55f283d0e9d35b9c56fb2b3514a5c4f86
SHA15869ef600ba564ae7bc7db52b9c70375607d51aa
SHA25641657910cd010c7e5ebbbfc11a2636fa1868a9bffe78d98b8faa7bd0e9c5c3b8
SHA512b5b78975c6328feb5e1986698174a85ddf722a639234eb6fe80cfccabaa7d0c09678c9465fd6a9586a0a412f2586d9e9d38eb5243626a2b44a8c8512322415b3
-
Filesize
13KB
MD5106317cd019b63fde3dc44b2e365d0e6
SHA1cf8158e8e6433a5ddd81f68558632bbad3d33db6
SHA256a288d0d898c7729037ab07a8ab05713862a3b74aba2c5fc55ec2cd590d547a7b
SHA512b1eff4c179096157252ae383860862fc53394094d76459d18568b669290c150291f671f8d80f7e741c436466e66cb0db197f79d9a9a9282961b3baa101f9d5a6
-
Filesize
13KB
MD5762e2c938ec4a35e6b67fafb977fd05c
SHA12082b2a1b33adcc4aae73cbc072eaac50f72ab7e
SHA2568b2951ff344d2fcaeb0045269c93e0ced5402ff53efe685cde78fba2293e6283
SHA512c688320e12ca1536217282a42c02dd4d19b97d2dc96ea206b1327866fd496f277c21426fe9cb3e894fdf3bd59d0da6f4ab787bfa4e53d010d038e1d3156f9dfc
-
Filesize
13KB
MD5b5fe23cf43111d7500a18d432d1a9307
SHA1e3b7dc412ce069a4262522b7c8e791278fc130dc
SHA2562d187bb4a0d2a51dbe68e4085815167c952803f310c323bfe6f39b2cfc9f6532
SHA51254ee18272c9d3e700452a69a7a0d56cd9ab32196878f059e3ab3fbce0558183c5fbc06eae7b7b0def3636ec6747867a138b1350cd8a9a2ec046e704453f4db26
-
Filesize
13KB
MD550ab74c3916f51cd30d6d588211148a3
SHA1cca87dbd37fc9df0e007c3a98ac7d214eee703a7
SHA25605609085a166cd35855e70c9b9e89372f15e35a21dcf6e0da8a30648b4950f93
SHA512094eb17919dfc550238fa202080136cb3d8298ee518618935c54ee4cab6b0c4e3bb863b9e53b1580d1bbe42b307dc72f0b6f4c47740bbf79de20ded3e4741320
-
Filesize
13KB
MD5c3810dc34fb0dd806c01d2a15617e343
SHA17e7a1635fff8401c6342ad3c68472b6ef1ed1d1f
SHA256afc9edae65579141465dd988495aa73366f942287ac85773f0c630b5bb3e2420
SHA512b8d1bf4fb186bd45faecdd11af29c2d30d97916d6d8ae94f55ca6f6d2d3dd771b6da09b3e56d0517da25232e8e3a72d1a3f4ef0b6dab7be48f020bf327e61893
-
Filesize
701KB
MD50e3ed8b5e5952cffc0e119b6082a6599
SHA1b8275da931abd327fb0ad3b102a5917aa950c636
SHA256e5797ef4bea22b1d24a9147c48726e9960ffa1b5866e04c11de117531483fe9d
SHA51215e06c4a477984dac67d7301d8019935af32e7a5fc47c6d69533f00e7aa3992cd8e496d02f05f9c2f4c43f3a928fe070276bdcb18f86bcab43faae3709522beb
-
Filesize
768KB
MD51560d6506f8e57432427df2bc4263f12
SHA170f83580e72e75f4a1b215abf55d9e07beb683f0
SHA2560bb9e107a5f5f9ad838173ebf222107d37cc1f378fa10f46ad5b2914f19f8e72
SHA512e5b0eff2054b6b24efeb9f8df23cd22e307d5fac1669e86b798d8caee2e3c4ea3e4c6213abe868ba44b37b689e5b52d4d3a40fd0167a476c06bc32dded69a202
-
Filesize
68KB
MD5698f5896ec35c84909344dc08b7cae67
SHA14c3eb447125f74f2eef63e14a5d97a823fa8d4e9
SHA2569cc2e2d5feeb360b2ea9a650809468f08e13c0e997ebadf5baa69ae3c27a958e
SHA5122230abef3f2ac7fff21f2af8a1df79a0ab3f7b1153ce696745ff5cef7f677bfe562dc820eb36be8e4819210ffa565d52e3b940f0cad5427d30a3aa05a4bcde2b
-
Filesize
481KB
MD5f9a4f6684d1bf48406a42921aebc1596
SHA1c9186ff53de4724ede20c6485136b4b2072bb6a6
SHA256e0a051f93d4c1e81cc142181d14249e246be4c169645d667267134b664e75042
SHA51267294a47dfef6aba404939497c403f93318841e9c5ee28b706f7506b5dff2630381e28e86f6dcbfdff2427092a515db1dc0a04e334e7f8de8b0b682269ff88fd
-
Filesize
316KB
MD5819ea2d1b7f70aa3fab1a5eefd8928fd
SHA1c13b663ec677b95631a845d2627e12d71ca96fdd
SHA256e00f4b1980537b569386c1e5d37410b11aa74a4f771311cec06d60130d7aa1c5
SHA5123e8261f470ddc9a06077ad352fd5d34f3c999f168e7e53b9d5c8c2d4ab9691af89ab208c09767b27519bcf9cd6fdf4e4df949ec219bca4fda1165b178efad113
-
Filesize
304KB
MD51b099f749669dfe00b4177988018fc40
SHA1c007e18cbe95b286b146531a01dde05127ebd747
SHA256f7b57a665ac90377683c434a04b8b6894c369d34fdb03273778a8c9f8fdbb262
SHA51287dc26b28cb2c43c788d9ae9ef384b69be52b27500bc23cdc6acc8567e51705d99ef942cdc0b23fa6a7c84d4ddaaa8f05865a8e7bb4ad943ba5deabf7a4105fd
-
Filesize
304KB
MD57f437ba23ac06e9f17bf831fe4610b7c
SHA10131f155fa2aee4a8d3c77cd795988f466eff6d3
SHA25669e4ee0c49e80e9aed263df6c7a62b6896a80972002b3e71b68d7623843c01d3
SHA512802ed8bcc7bb2651794cbbd0a0391b931b6f776551457496d9f461f7dea5d9b189bcf388151544934f72164c75d3e91680a053313e0e2f293bef120b8ccb837c
-
Filesize
51KB
MD5fbbc99e0b5c7a5f4b76886520f5a4f63
SHA1361b841c52643792c26868f90e0330ba2ab131ae
SHA2566054e52edc7112fcecaaf39f37c6bdaa35f98bfaff45d4e01802b9a8bedd2eef
SHA5125de0b99a9d3f7cdee1d9ed8122c62f096b59cca93c9ad4c4eb15da6bb08d5ea07c09f2864e8a841dcc4095e890e47dd595f51c535ab37713f807a151de52cb11
-
Filesize
668KB
MD5c1915f095d3e7b2ad07b5aadc21be2e3
SHA19643864f45e15e14e95545cfae9462c977933ba4
SHA256b0d8f20c0bb09ab90c44281d372e98520c94cecaba6a374be64dc4fdd45f1c89
SHA512e1dbd8501409dab0537b9afdb8961c3031280e0968f0dc0bc3339e14af3e1f009bdfa0c5425f62590f1db6c8c33fc65b95da65cacdc83338128a7887676bee13
-
Filesize
552KB
MD51873f27a43f63c02800d6c80014c0235
SHA13441bba24453db09fb56e02a9d56cdf775886f07
SHA2564bfcba248d79dfd6c2cba52d7c9ee18842f007bfa0e3ba99ababacb4794e8c6e
SHA5129f2b663afc1cc3dbc8eba3278f61ffb41c19e42f94ee4c8a60eff83c8846b81d34e4ff869b643434a8ad5657c46bd06a712f0598062b62802ba6f0ee6f4fb8f2
-
Filesize
6.6MB
MD57306abcf62c8ee10a1692a6a85af9297
SHA169900ccc2400e685b981b3654af57c062ffb44e2
SHA25637c9a26faec0bb21171b3968d2e4254f6ae10ff7ae0d0b1493226685bc5d3b4b
SHA512cd00a60387e06fcc6f14242adb97a54575a49cf1e9b22c74aa5d8bb7617e571fc194049691e4ee0fcff8bdd659b04de62f46d07e2f3330c18ac7035134e183d1
-
Filesize
5.0MB
MD547f2701f1d1f6645baccced737e8e20c
SHA156e90cc7888e2cc74916ce10148a10c9261fdf2f
SHA2563d37b55464bded5c54903c5328e695d9b08b483e65cf6bdadd4ecf93954dfc9e
SHA5121b3f47fa75b041e8a2e144d3e98d103e90ed119b530ab7f7ac61ada3c4cad9abfac93a480b2236f1f6c9093f2ea9529acace77ac15f851450f5e16015735b045
-
Filesize
4.4MB
MD57576665937a9a6a9459bad29f822468a
SHA1a9cb55bd95b03a511614a92e2ded68c835f83a8a
SHA256006a23ac8ff7c1d4d826f776e00efb1ea2ec392b1239f8b60304ebb3d4b1f29e
SHA512c5bafe24abfdd48fe1cd57471ff211085e3e02ef66df4461bd18bf9adad01fa7503d0a416e5603c73f397dd3cdf69b3974c98df33e460d44fa1da3e6e7bdfb46
-
Filesize
593KB
MD5f74f2df998219d602185c46107329e82
SHA1a0f8eeb2e5c712e690923fdaf3b7cefc64f3d63e
SHA2565f569c72db9c31528daf2e907938b9bb711ea3a050efe5bf5d514dc962c5415c
SHA512b28e1eafefaf4f71666bf6c216c8672eb615a5e369bd913b85d99b2774df76ffaa489f145722a93f80f2afcb76eef40e62dcf246793bcf867d696487e9343a9f
-
Filesize
307KB
MD5ef8320eace6f753231666c61104bdd49
SHA10166aceb79a7d6b4a041fd7595fc1d75404a4419
SHA2568e2fa428fa5e7092d117dadf10529a35f415a0b8fa27cd17607e23dd913ffcdc
SHA512354676c97fe1666920a75fdbffecfd0ac802613572b9e7d0dbc9a1ac24b3c771ca8fa3c1f3375f0a1c90364a07fa22469d2e7eb822196c0a2a1893931b62efe9
-
Filesize
538KB
MD56b1bbe4e391cdfd775780d8502ccbc41
SHA1a910f7ac9ed8fd57f7455f04e99bcd732bc8241a
SHA2562999b0ecf157b9f37dcfa1cb4a0ffff73092c416499a356fdb1558d66985e9a3
SHA5129ad2ca4cc8af0b6185be87d9026da5cdac2c52ff15b0fd2ba333ff3a25016e06a294d7cf5cf32b1869a1f5e3692f071f582ba2151ac16f9be738ea7862ab57d3
-
Filesize
499KB
MD529e3de6b17d0fdfb360834f038b59a39
SHA11e3fdca7e4dec1ebb618f69675928363657ba064
SHA2568cf6a3d7e5694a0453d85e67a038bb5804b6eb8969287f1d021bdb7b95234e9d
SHA512ebf889085bb105182739d7a748d8b12b26de3e47f11535260adac23beee3d5b43aa572b6043ace7ac068cee36529c3cf448986f3218aec742ab6fce4db47440a
-
Filesize
48KB
MD5a7ed4ba445aa61c4632dd6579c212bf5
SHA1a81d766d12a6dd8c3cec537387a089650b34e103
SHA25691fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820
SHA5122a0e0afdecf803657f2d67433399dc3119a3b4221334a9c8d7cb3e3e741457aaa26d2edd32377a102f1c539a4ef065cb5296d4cdfe7657993223e675e3fd4bae
-
Filesize
712KB
MD514b98daca4a9912ad416eb7c0231cc21
SHA158328f022b71c8b3001449e87f91fbad4ac973ea
SHA256850752cfce58c44ce5d48735f4d53ccc1f8d12b7e1ae00d367d9c42103d9ad99
SHA5121169760e0245b4b1f2676271e0e56b62db0157a08ada4098d7dfacbf5c1e2d6cac29275c04a2d59471d7a9d9420425c07387c63fd3bc9bc4f91a9b3d5addcb0a
-
Filesize
5KB
MD568b287f4067ba013e34a1339afdb1ea8
SHA145ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA25618e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA51206c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
1KB
MD50c77ca700a207d907c33fff6f9b02090
SHA1505e6cd5535e4ad18bff8e589fd835065e9c51ad
SHA25600ec60211d30113fbea496f7325d90a1446e5089f7f88908a951eceb7c7076e5
SHA512443e4f042386f2d08d29e76337cf5a1f91efce8119c35184a19d75bbd178fdc378c30440eb81c156749715e07ad3ed5d068d588db032686c2b14c948d6e39146
-
Filesize
1KB
MD5ef6c470c53656b9ab3e271ef928c398c
SHA18ab25953e2f51eb09411bbf35059d98925464829
SHA25683489bf294d341681f043b99bb005bfcb88a0dd49293fab14f0521b78732b85e
SHA5123d290a5cb2c5aeb8dc7b5be803462141df2901f99fb37c3e80a7a6cf4afb9349b1c5537d98e431552a4fe832f58dea982761d3745ebe62d8573ef7dad4bbe549
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
151B
MD5bd4088d6deeab07d72636a6bd06bb6dc
SHA17a32be6707787cecea0b000fd8dada6a6a3b3067
SHA256fdaee81090ec13989a1ad3f3a115456cd4f734c7bafa1ee59f8d641cb6ef4167
SHA51227807b11a1449e167cf1859143954148c05e0b8af26b50dd51bb5861140ddaf1cf40389c4aa6ae174e19cf402575ccaf48c862c93172256e0c0f8ffd8280a636
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\AlternateServices.bin
Filesize8KB
MD5ccc9dee4a30750c792dbf5442a5641e8
SHA1e541e0bea436465dfcfb6816ad73851556ac927b
SHA2560748c1bf023dab743e7c3653b09a17ccb344b52ace9d763bd6ab7f2440cc703f
SHA5125c3d4f1b1defae771df5caa9b9204db3d6fb66e6d09c0c77bc6d105e5a1a68ffcb305a21efa1d860ad817aa797f22eb480d51ad15bc52e78060403aaba8f05a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\AlternateServices.bin
Filesize15KB
MD5fecd02e0b062a7e1a3b7b3071efbd78f
SHA1eb8edf01929b951595510c82ac813b5f93df44ef
SHA25604d21064cb711ab8f8144b13c55543fb0f669807516616e100a6b34234a26c25
SHA51238af6032a555e4c7e0def06a79f8f5875edb5610dbc8a1776bf8a6d3379a4c31ebea249949f5a0d7866fceed6f385a73dbb97f306039b4569ce4db20e67d2493
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD52b5deb46b5b858dc2b246132e904d2b0
SHA1efb8afce56aef23e16462fd711bc784e30e985c0
SHA2565c7479909ec2f165638cabb34d316b9aeced1bf465e91cfb72002395745e3ad8
SHA51268304fee6c8e89832224357f6f56d3ea5540e6f744e1d748d10ac67048ab7a83acd3da426043bd729f8dcab9286859546840bed95b944373ab3f6366f77ecd64
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\pending_pings\135a03b6-d053-4423-9db4-1c9fa0cdec29
Filesize982B
MD5a2c2e75a69a593a61701cc2350f60569
SHA12ac3151318ef572c6360c8fd6fbbb4abc02b238e
SHA2566f92570c891c83f1fdfee6dd1176adaf1352e5c6ce917aa431a6675ee5062d0d
SHA51224f6373efaadc6b42626375a419dbde214e0bf9247b9c00a27c1a4ce900098354dffe751bb1914a098f675d4c93110b740b4b43755699e71b05cac07e7efac5a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\pending_pings\9507c765-9961-4bc8-91b0-6b3d2d0da577
Filesize659B
MD521b06c8781541c065aa6a01de71fb5bb
SHA1fbc0d8ec7f130ee2f93f6cd503956cae90c923d7
SHA256329f619ae6ade9fede33ec9d66ba8159124671846e3b980a0215f68af48fd5ff
SHA51244122e05e981952cb2dc62f43323558208d3a3eac307cb20cdf5b8bb1109328e7666024db15fe8467d2d0e93d072e931973e5ff1bb630318a717c406dc7e7082
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
Filesize
11KB
MD5f87a4c1d4855e91907de7e2d9cf459b6
SHA148dd1ac5b10186fc7d70a7547f1659d36a8612b9
SHA256875e678114991eee8657b3d47e09af2cb032fa9fca4b72ecf8fa09b95a990136
SHA51219c13819f0e28d85ecf775d9b6eb5e6e41d447ad72035472c39c44c1b1cecbebedee778d74c4119babead4ebc851d2c918bfd7fb408bf6555f4c5e067b858f24
-
Filesize
11KB
MD50d22008a5f6ee2f6df09868da95e00a7
SHA1b0acaf552b9b2eb19841a1e5f199456d725df491
SHA2564679da05a11dacfb0d18b93384f6e4e6f74cc57de1c9756f9bec96cc5ad08284
SHA512c3fdd1e9044bc9c30a6e71a77ab76a504698a1e694b24d432b42682416fb664e7aa52124200c35fcc860bb37dd656ae76ef89ed36bd7af446fefe20aa2b30a0c
-
Filesize
11KB
MD52c89812ab60aded00907dd34b15b85d4
SHA1cf4b8195d7192db432b846518960238a7aded9ef
SHA2565722083432f2f97f813e12ad9b78ff57fcd01d148e729a51e8ce9ad6728d1e63
SHA5123fa293908bf7acf516276d83cb187e6a4cecf436480d3b3e5177842c3b39ae12c7423722cc79d3b96acdd0177dd1d4c57f81b5b0a18efa10b2932467658142f7
-
Filesize
11KB
MD50b4d63bff7f34c1dcf52322952b11868
SHA119ffbeced92d0e20a7ce925e940251efabb227af
SHA2564d02491ae447fed1622d432e300447eabaf7ff0044319bd7df724b83dcfdb699
SHA512a7bdf7be547bef8c01ad3b92f91a5e77373c080f4e30902bdf5d356efe7f890fa4e1018af0b8ba04c5238e9dd24e3ba4c169730fd0f39884f6dc53ba4a900980
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD5a5d413e1e175b43edc5d62a9e4bb50aa
SHA12afc3db5d59adc3ce2551f6bc63d32851b6a99db
SHA256159456927921fdef9407bb374d031d78423d1a032770c9ad105fc438b0fbd0ce
SHA51278d30b9d5486ba55563c81b3c10f2888e7ad5010fd9f31b69e5e6ed8dad76d943722aec954c1fbc28b0d86f68ff90a97497276756ad174f5f81c5fe1dea2187d