Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
rama.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
rama.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
rama.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
rama.exe
Resource
win11-20240802-en
General
-
Target
rama.exe
-
Size
1.8MB
-
MD5
6e5042ff1ec6df9aee18f4eea7864524
-
SHA1
19e4eaaec31c8512b191138a439b6c4c7ba73d18
-
SHA256
420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c
-
SHA512
ac5c8537bfd0a509ab49911cdf180778e9e47f9f9fb600933b2ba03f939f9bc9834db5a106840382ee648b289cddaf69b55cf969f51b9f89c49c678f1edc202c
-
SSDEEP
49152:2M3rvEOaXgE3YC8ZtDYYuyVcBUpxOePEEmeweNX9:24E9QiYC2DYscuEEmdu
Malware Config
Extracted
amadey
4.41
c7817d
http://31.41.244.10
-
install_dir
0e8d0864aa
-
install_file
svoutse.exe
-
strings_key
5481b88a6ef75bcf21333988a4e47048
-
url_paths
/Dem7kTu/index.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rama.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rama.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rama.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation rama.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation svoutse.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation ba193dea75.exe -
Executes dropped EXE 5 IoCs
pid Process 1760 svoutse.exe 4884 ba193dea75.exe 4764 svoutse.exe 7164 svoutse.exe 3864 svoutse.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Wine rama.exe Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Wine svoutse.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ba193dea75.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000008001\\ba193dea75.exe" svoutse.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1132 rama.exe 1760 svoutse.exe 4764 svoutse.exe 7164 svoutse.exe 3864 svoutse.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svoutse.job rama.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svoutse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba193dea75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rama.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-523280732-2327480845-3730041215-1000\{FC2EE389-09CF-4FE6-A3CE-34AC0DD692A9} chrome.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1132 rama.exe 1132 rama.exe 1760 svoutse.exe 1760 svoutse.exe 2272 msedge.exe 2272 msedge.exe 3960 msedge.exe 3960 msedge.exe 1224 chrome.exe 1224 chrome.exe 4764 svoutse.exe 4764 svoutse.exe 7164 svoutse.exe 7164 svoutse.exe 4912 chrome.exe 4912 chrome.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 4912 chrome.exe 4912 chrome.exe 3864 svoutse.exe 3864 svoutse.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeDebugPrivilege 4320 firefox.exe Token: SeDebugPrivilege 4320 firefox.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1132 rama.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4320 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1760 1132 rama.exe 87 PID 1132 wrote to memory of 1760 1132 rama.exe 87 PID 1132 wrote to memory of 1760 1132 rama.exe 87 PID 1760 wrote to memory of 4884 1760 svoutse.exe 88 PID 1760 wrote to memory of 4884 1760 svoutse.exe 88 PID 1760 wrote to memory of 4884 1760 svoutse.exe 88 PID 4884 wrote to memory of 2820 4884 ba193dea75.exe 89 PID 4884 wrote to memory of 2820 4884 ba193dea75.exe 89 PID 2820 wrote to memory of 1224 2820 cmd.exe 92 PID 2820 wrote to memory of 1224 2820 cmd.exe 92 PID 2820 wrote to memory of 3960 2820 cmd.exe 93 PID 2820 wrote to memory of 3960 2820 cmd.exe 93 PID 2820 wrote to memory of 1356 2820 cmd.exe 94 PID 2820 wrote to memory of 1356 2820 cmd.exe 94 PID 1224 wrote to memory of 3156 1224 chrome.exe 95 PID 1224 wrote to memory of 3156 1224 chrome.exe 95 PID 3960 wrote to memory of 2624 3960 msedge.exe 96 PID 3960 wrote to memory of 2624 3960 msedge.exe 96 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 1356 wrote to memory of 4320 1356 firefox.exe 97 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 PID 4320 wrote to memory of 656 4320 firefox.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\rama.exe"C:\Users\Admin\AppData\Local\Temp\rama.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\1000008001\ba193dea75.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\ba193dea75.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B508.tmp\B509.tmp\B50A.bat C:\Users\Admin\AppData\Local\Temp\1000008001\ba193dea75.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffb87f3cc40,0x7ffb87f3cc4c,0x7ffb87f3cc586⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1912 /prefetch:26⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2172 /prefetch:36⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2448 /prefetch:86⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:16⤵PID:6532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:16⤵PID:6544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4400,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4452 /prefetch:16⤵PID:6952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4612,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3548 /prefetch:86⤵PID:6792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4604,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4588 /prefetch:86⤵
- Modifies registry class
PID:6804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1164,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5100 /prefetch:86⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffb87df46f8,0x7ffb87df4708,0x7ffb87df47186⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:26⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:86⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:16⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:16⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:26⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"5⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {97e43871-ab34-47d1-8379-1fd8a81b3b30} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" gpu7⤵PID:656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21e1b5c1-9642-4049-9409-2e3f71f947db} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" socket7⤵PID:3612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3096 -childID 1 -isForBrowser -prefsHandle 3276 -prefMapHandle 2744 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bfdbe9de-46aa-4982-a111-e1cf24c59123} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab7⤵PID:5224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3636 -childID 2 -isForBrowser -prefsHandle 3644 -prefMapHandle 3660 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4269a8bc-b14e-484b-9d3e-4aa72fcc7a94} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab7⤵PID:5472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4768 -prefMapHandle 4776 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e410359c-7732-4ad2-a39c-d38fb32f44f8} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" utility7⤵
- Checks processor information in registry
PID:6136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5416 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5408 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44fdc7cb-72e2-4d1c-afe7-eb0b33561188} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab7⤵PID:5616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 4 -isForBrowser -prefsHandle 5424 -prefMapHandle 5420 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96440fdf-3029-4ba6-ac42-08672e9828e8} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab7⤵PID:3668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5824 -childID 5 -isForBrowser -prefsHandle 5660 -prefMapHandle 5656 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b61d752-d89c-465e-b0a4-195d7bacf5c7} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab7⤵PID:6124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6036 -childID 6 -isForBrowser -prefsHandle 6056 -prefMapHandle 6028 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24b07f14-6281-4d09-8e29-7d031f65c86a} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab7⤵PID:6224
-
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5552
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7164
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3864
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD5c0b89babbf37ada25f3919f4d1db24f0
SHA1115ea2339cc8f7e5e30ceb42cf04aae3a4872803
SHA256f5fe2b81ff77c175fc6a08c0cfde79d396c811d7b1284dae0f0f6876f226b8bd
SHA512e4b6b3cf04ea19ffba9c24faa999bf3aa1813d571b3c29986afebfdb3ff05c948f3ed92c299c8740b18d2e3b920956744b1c3292478aecd8cc2c9f925618c09e
-
Filesize
3KB
MD5803cbbf417bde4624a877dc53b98b6df
SHA1ddb16c20cf257a917888a851d64f98e204c044bf
SHA256d0793c010808228253934779e464d7c6a80789e5854376dbbc03702c8e2b3cd8
SHA5123a9d9e645b8b1ee8957172efa02c98c9694f47dba87ee5dd0fa10672540d73f3cfa6975dce96014447b85018ad209524f8cf0f79a9ab486685809a4b7e1763d4
-
Filesize
2KB
MD5e526369b92cf1abaa3e50713edb11811
SHA1bde3d0f1b8fb52a6b28b9de39b8dad59059f7acb
SHA256f1c8e10fd365dd2d1b88d0422c5acfe74adc23efc61bf438b7d984aa05c86d4c
SHA512b8ee4df48f66c1b36df6f8c590d795a146dcb061e1c2e941a40d3832049e0bcc829612d11ebdad6544d870e019dc19bb1ac528df5fefff133bf0ac1cb9b630de
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5d64c92230f0b4c77dfcbaa168d8ab7bb
SHA1ee9833530606d338cb1e021485e4aeb36b679576
SHA2564dca360468953b35226fdbd295e6ade172df572629cb53da1631bc601d68d148
SHA512b0dd1c05d546c09a5d474e01f78833f278e8c51e1ef5eb82089f7096106f4faaa5c47273642d6bd52a989240d8ec282da0d75ae4cde2ede6dd1bb783ddd2dd97
-
Filesize
9KB
MD5355aa6a0bc9ba52324c7653ac5f040ba
SHA19245e40886e8a3933bcafa9d3969254613e4bf20
SHA256149a70f23fe1d266a8f1b0d709726baf2844d3232b5eca3a7cc0ff26fb93c1ef
SHA512890f8082be8b8b532bbeea2f506eaf0e13ed2976a77f65518b105a54a80186c3170946b99b9bca34f53ee9ffd15b919f1b749a462418955f233024cde41e4438
-
Filesize
9KB
MD5adb210952e2bd87494e4b82a6c2e4acf
SHA1f02116674e2dbf5d0f25e1dd2a0f988c78b920cb
SHA2562f0a7b431281f7a740315535c18a88de24cddb77597f61bad85a0beeb9f07b0c
SHA51294df0e4061d733b490ad0d30928939735df2a906a01e9a6f3a076598a69484b751624d9082bab7d1f46e3a2f4414a6ac8b5b4290a76156273b38c12321f9b6fd
-
Filesize
9KB
MD5911f4cd5c86f993eda739090faf12251
SHA138f0636c67099ecba861bc663da2805f39d17290
SHA256c1648d8f17da5033e0812aaae179c962b0cf8f1e96780faba0bf8f7ce9065b58
SHA5127fbe4e19e7ea9d6b5fd1af64bcdfeb3aefae857430a3159ea2641f18006e91359917fe63afd635f755052c3d6248bc43bff5d9ebb5f6b4518c6dfdeae1d3b6e0
-
Filesize
9KB
MD54b3badcb55cdb2ea1efd426e73153e8a
SHA14cb64205d5263856341a73984903727ca0d475a6
SHA256eb89afc41b5799a21e6982b1adfa1f6a94ca8ff51f4cce7062f5bca4ea9a9dfb
SHA51242a6195da7ee3eb4d8348a11123c269a829df775a3e7c36df700ec688d3168f200e33239437a9da0a64c59ad6b29d3534e21dc990dec083ac2c81710b91cf76a
-
Filesize
9KB
MD5a4c841644281c0f6da51d1917b126959
SHA1016a1dd07602915d1dea332085f14c99c3a2935f
SHA256e2400b8f28f17999dc83e517efe919d3e2ab3278d1933a06c641e1d831e67343
SHA512870e77a9041609420979ab233ddc8d00ea3c2403f103a36742e123a0d1f59b21e82b26d3bff54d7e43c9e007fe02b7fb215a5e83d5ee1b5b103fdd62f481a4c0
-
Filesize
9KB
MD59e251c7653877a46f2d600dfb45c9c56
SHA11ff35648f805a916a1b8ceec8c5fc7638f69de02
SHA2560bf27db24cf75c47ba1676c7ffa0c6806403ae3fcf749097fa5e40e3fa1dbf2e
SHA5123f62c7e329dfc44e8457357233b5434443ac17a2484d115615fc12208c9207203ba41759b9568067946158bdbe1279ac64e0b19d47b90843cacaa54a9deef28d
-
Filesize
9KB
MD5c17b3743c5663f6278e443031e773e0d
SHA1f14fc5daaad1a580b40a787f38c0057c3f9c58e8
SHA25644bd34f6e7d3b3451eb5fb51e0b74105d75777d104db8b005873f0bff883a316
SHA51241ee8c3556197dee4087c7e90af292b0739e6c2cc3f63b3a521ff13ccf6825a2df77e15273ecb0c676c54b93f5dbff67bedb1cdefe314dace3f0118e63a453c1
-
Filesize
9KB
MD54497a55ca723905bd6c4404d18366aa5
SHA1d6af30badfdc28a105232e21b8db74ccb2f80489
SHA256394a15585ff86df0a1e00142a14791b38d809aff8c69738a90dea930f2988d81
SHA5123612d10c15e020ede844452f3ccc854e9f0dd20752b7a4d34a9e765d341f5d6174f356c0a703a2af9af0247da4945e6b2443f9c424e0b8ace2be98231eeaaa1f
-
Filesize
9KB
MD57bb8db4f42c6db350ae3f017efcb4fb5
SHA1e6fe3b0e432d9e21843f9e5abcee524309ada31c
SHA256dca29cfe894e04bde65405c43c89693ba21cebe268a2e9ac541b770b8b84be80
SHA512d9452f28ee9f3c4debf6cffbe479e329e752ea9d42ce95302d992b7ac95b6bdabaa7daf1dad28212e3c569395b0586677048de58651817eef9d1bea6ab7433c8
-
Filesize
99KB
MD5967e807457fbd57a62414ff7d49c0339
SHA1add565343c17da5ffc76ea71657dd9e9c6e153df
SHA2569ac1202606dba2bfa7113825439eb436617a5402eba9b50f40c9ae37d79d5925
SHA5129b6aeb6dda851d75416543199aac261d69e3aaefbb0ec76748b261fc61e4b75ccb0b0ebeb6e9ec63dd4b9c38aecb8f53f0c7a5a3b0c5fa89c02e61b8cc00ee8e
-
Filesize
99KB
MD5aa82b28e2b996eea75210f7c84736aa8
SHA1ec4172b8ebb0dbc0ab0b73854b5101fbe79b6650
SHA2564bf1ca2cb500d6fa6f93055ff2c03e7b1ea74fc529dc37db8c023fbc9a550906
SHA512c8081ca18304c9f999d8470d9645d1b1355e6127c0ae201cd12b80a7dfc7d1470d41fbab9ab9a9be82a65eccf8d622651db31eb8778460c84e3fe6e4545d1252
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD585e107dca95c5de7a3137b32068fe232
SHA1a367052780817e39138acddf9b1c565008e52ce1
SHA2566ff748d343273a1bd6c6910356797de92e264dbd66b89bfda96d6ec106e9e117
SHA51222e51425a25c8b9eb96c7cd47e55abedd5889a1055ce903953d213e1df1a48a1bb6f246ced85db64fe595d58e60007ef28f20ef4525bfd5ca4c23a2b5158e8ef
-
Filesize
1KB
MD56712911afdfdb6ce11e2ad9c5005f27a
SHA1fe88f12a1452db9ce1d983b78c8f051ebf7ed516
SHA256877b29bd0788c543cfb31fc5bf4950a3e6ad56f2ee67856925b3edf7349a6991
SHA5122baa5dc55de8b872338029d534006cb7d645c70aee591b06cf88990c5800c55d2b10a596407ed08b0ebc7cd9df3691fd768f59eec6871009ae4f3f83875d637b
-
Filesize
1KB
MD585c57964da463c1b97de9d527749db6f
SHA16361a41804ada71e354fc4ddf666b3c3e434e45e
SHA256992eec34014324ca560b23b827515d6643babb8495705667505557b5f348ff36
SHA512e72730e6d2b76795e29f9b477ca352457cffa492c7a054c375ad469d8953004dea40bb51f801bdca66e7a12d838c807e91fc2b428a9c8af9cde87d44c53d17b2
-
Filesize
5KB
MD5ef1a4479f324340ca2b37e485f9f9a57
SHA16bd5d46609f7e2b509b9a1d7c940cec6b49906e6
SHA256b0c18f1320111ce0b7390a7edc572061ee23db4b6e8f46e70e39da6035acf3d4
SHA512ed97e0e598ad0582062308225c1063eebd17e9985b38ff34e572bceb2dff56c4b044c394ae40fe2de110a879a119d4695cc9d4a43389dae343bb0a95795f8c3f
-
Filesize
6KB
MD58371be9bf19a010f834cc237c86986b9
SHA1c9d6daf44a66fefebcf5dd4baec31d2049bbd0b2
SHA256c683873c8db7e18201555fada422c51b75d0da79f119bf3485ae594b8bd4a19b
SHA512a0a3106b2ef260df38940ad7cf79ca3b94eb9f783e1f808c032515fcba73ebc92c990699bed50214188a3f490fe9d79348e1ff2a44a9fc3ee601d3d89ca6b272
-
Filesize
10KB
MD5d4443da0112233b40967d00dc4173448
SHA14cf9d1d16f9582f95f42c6ab30883003c2572564
SHA256f285e14ea39b309cf3bfaf9cd0c6f93f23381aabb04a5dcd74f159b99a9b0b11
SHA512538eb5efc9f84243e5bad20dc0e2c90ff40198b2fbcfc6a5df894433385149ea685a7e0405aedaf218213aa95b65fca395fe568bb9735524a9ca30ddd64a9e57
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bxumog7h.default-release\activity-stream.discovery_stream.json
Filesize36KB
MD5fc373f37ac1f5c4eba5036da93495fdd
SHA10693b850df7b259be044350c0a7e5eea33f1eaa8
SHA25681fca07152c0ea7b0d3f4ff8019a017350bac75629a72f214878250b659bf2cb
SHA5120d9a346b5bc0b6d97a2010d2456ebecf97f02d7520240fd809e5bace29d1442cc367bc165c9ea52f5334882827ea2eb405c37d45a92ca63ee805d55067026fa3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bxumog7h.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B
Filesize13KB
MD5298d471971e3aa2a4cc92894fea65e46
SHA1b3685324838292c2dec0b61ca4b1b39815c89e54
SHA2565c5e7a7610e47c55a06052efc3d4b113874fe0297431972629caebc238e21650
SHA5129fe52d0ffc5affbadc9342bb9bd345b8ef5a02b289b11ce3c9635f2449ebbf578acdf363c15a870f62298df5f291faaadea8c17b11608b3ef6601153a55288af
-
Filesize
1.8MB
MD56e5042ff1ec6df9aee18f4eea7864524
SHA119e4eaaec31c8512b191138a439b6c4c7ba73d18
SHA256420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c
SHA512ac5c8537bfd0a509ab49911cdf180778e9e47f9f9fb600933b2ba03f939f9bc9834db5a106840382ee648b289cddaf69b55cf969f51b9f89c49c678f1edc202c
-
Filesize
89KB
MD5cc86773e8d2f2c3ade17e0b062aecddb
SHA15e7790ca0b918b8e74e4e85af0c08f81cb4ade0f
SHA25651f4ab5d835ea80224cd5ceec0fcd7cbae80ffc1216b3da35c498cf4b01224cd
SHA5129f5bc37e717063dd0758bbcd77789038aed67b191a0ff23ee6f408a08c9b9992f298643108ed148eacbaaf9322b65acc82f3737e3da664f7a44b96796a1b4350
-
Filesize
2KB
MD54ac6a9d9e192f54598f8b67cf299ea5e
SHA1c3c63fc731603f581ab71bab7651a4d5112b04e6
SHA256f1179bc15a8c644c353af64d6c6c3f13fd2d48eed2fb0b709a167185d2ed806e
SHA5123ff1226c147403aa5afdc515f260849196dec92166273206256ce8437a98dc1dd3b2cf913861e7537ccf36d6bc53537bd49b600e9adb1671f4bdb3d6e3da23a5
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\AlternateServices.bin
Filesize7KB
MD54c331b152e47f73dd50f09acc3661659
SHA1cf5b26e20a10bc5c0527bb2fe76e733d7fbe340b
SHA25685bdce7689c9bb17695cfd3e5ba5462c1bf8fc30b88ea41e5af0db0917cc243f
SHA512f24f2bf2482e58ce37f99d72811dc4f31f349146087c6ef5bd0ced70996d67335fcdc0e637fb84dc7c1be66ec31399831a7a2fc8752db21d7963fc2cea89dcfd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a0145ac4c530762ec832120f0dc63b8f
SHA13162fe0474f0db4e6efd71d707069007f5c3784a
SHA2562f981b4afdf95c7fb75ba3c961cbcd548c66e179c4f19b20bea1b0cede00dcdb
SHA512ed9d9b834b4eb8cd547e6a6058ad803992cf1609d221d43dd296e97dea0dce44ba80ecc1029c35a20356bae81fea869238699c735b1f323209f0786ba7c780d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\db\data.safe.tmp
Filesize4KB
MD543cf958afe371fa122bcc7ba159082f5
SHA162b2e4643774839fb7aeae51a5cdf87bb5c99d07
SHA256fe6a35265b9d527f4276d5cc93ed984d8f21b41b6016d40b1c0b83a6477eed8d
SHA512b5736717f004f64c2c75eb285ddb96200fe296e4a914988f62d8907d0e9b802a9a4c77bab100ce8fdd8285d1783f6dd9cd897c3ad4def124099fbc6710db7f7a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD56c2ddc031a8f3cffe086fede147373e3
SHA112c693a9c63e40aad569cda95bf51f87454377ce
SHA256ca3066d6dd41c531e660ac88bbde60fd530a9743e89870f3f2adfdce25c49a30
SHA512870ce9dd660250ed16fc63b14cb9b3f82b9ab263cf023e37687e981e889366d99bd6b186faf8df1f96813a682b309c10972f8ae69c9c4def7498431289768b48
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d139360f53687f7d93655b24e2cd4621
SHA12d707f0295235205d03e3a90ee4f84909be54dcb
SHA256e4040dccd333acec7380c7184a19c1c2d7aee963aa6185c6cc218313415f6e5e
SHA512f289e392b7cc6b19ecc039ed463d4b89dd821d12660f7de687ea1b21d14b0cba8f2690f9eb7aa41c1ce66b75ec777fb90e45c77d72bca70c967b389795fbf4de
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\pending_pings\5a41d54d-9e2e-4c9b-ba52-e8a99b8c3d29
Filesize671B
MD5ef32c4d9b3fa897b77c6b5f05b6760d9
SHA16bce569274d290a722151609c0ecbfa5d2960a7c
SHA2563f706fbf6c9f488fb091b5f6c8ad73a703b3af972d8c5f8411fedc00dfb90189
SHA5122419e51f57e809d77489c16eed99db7756ae5f9d076481280e421a6d0ad863e4567a49f4b164212b3deaf6a9e94c001e7d68419a9fc920edc807916d77a9483b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\pending_pings\76f031fd-9dbf-4a49-bfd3-02198b5ca3b6
Filesize982B
MD5d9ef360ed2b163fa62d3f9e6d9157b89
SHA16e7c70aee5a52562c5e918441650d5856f81789d
SHA2564e211d4b709a49de1e1280c995b541b91e2cf3410ccaf6856e801c50051fcfb5
SHA512479ed3b9fc9f5d1bb8d2e5a8f303ddccd44c3729d01dc0282149135318116b1f00e80aa14cb925ff260cf632ab5c3d18d65d38d931b8cb6a3563dee61d2912d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\pending_pings\ca3d3204-437f-4c56-8133-cd0e59096285
Filesize26KB
MD51effe4ce7a69f9e586d12cbbc149d999
SHA16b221ddc410cad41b7d03739bcb98906703904ca
SHA2563e9461293f89332140a747373e2896bd9aee5a2bceca15f8c3c10a03c4445c10
SHA5129daaecf7213266b72948d3b4a8c58a2e6c8e12a88947f1f975131d7bbb2ce28c01b8cc91c628d395f910f71efc2d96c14ed7018242b24d61a8f532eec17aa915
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5a5440d17c6819724b43f6fdc62410ecf
SHA1285b5abccf36bb373d9df1fa4ff689852d463445
SHA256cc8c8dd42f92d50be63bc837929be754a9e1eca74bca080ba7191810877d1135
SHA5124f69692a02e17573ee4b15bd87b0c7067f69a265c25fe6a77c1563390c58fbb238c4c1411ac97f6c34bdb9a039ac662dde65d8833bff115a5e972844682ccf92
-
Filesize
12KB
MD534d8a03e6ebbe4aa7d1544b833780aa6
SHA18eb55e211a8933fd10fc28dd47894d64327543ba
SHA2563f4f310493ce7c37344d031cd06fa3435dce6d34e62558baf7268bc174381b9e
SHA5122fb6695e1aba6791d6622f5ca031a2360d124440fe1688184bf6d53869012ec9be13f439c388927b24938bbca43dae392687e289583cd837f41fb08a675e4341
-
Filesize
16KB
MD537c7f99042d81a22f875c39ec746edb7
SHA153dd9add8b7dd4f0d991a1c65d144e81bbb6c63a
SHA256188a499982501414edb272b9589041296c6262bcea9c8bdaa9a7c6c97f9e95d0
SHA512785e0021e4fdab304084eb70a252dedd790c48c2779f8d34a7d5a2d6c0a77b97978a68b373b22cf1c62ab6009ab0af0fd84467319abac4d12d7448fe00bd3f23
-
Filesize
11KB
MD5700ca0e6abe4eabe5a772f20f66ac6a4
SHA19d4652407cf7ac38921faf119f7fd42feba028fd
SHA25613d758738fe6a6d5496c52e4dbad4c1369e7473cfc1815ba8bd948ea79f6aee1
SHA512b5255d7f1d8785d8167e919dc9c28a2a24b1c915ccc4f5eb469ef20251e16dfd2242e290592facaa108dda8bfeb0f0ef573f48536800d435eaed194bb21de6c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5bd87084249691787e4271434858ded38
SHA119a80f831f542367c11f50dd8ff6d5d2abcff0e1
SHA25618987b31a844ceaabc6ed0341ca3d3d445cb5da33f736c8ea4803cac40946824
SHA5127b62dc5322ca0b614bbe0a1d3d6c8567585951c5e79c033c4f9b9194952509aeb1836da69416ff6529b4534298e055ce048f12f2125d961cf65f33a27c544e42
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.2MB
MD5e8acaa8c54e65bbb17f84591532bf886
SHA103f33bf4e99754af5cc576ee3fad693ebafc95e6
SHA256eabf80b5a50d27ce4eff365acb853790e71df53792dc1ec7597c5c6673d9e346
SHA51286c34ce59ae4f2fc456b7aadb2ee7f09701eb7b51eaec09cf4ab8deb0ddee10bdb750aa582690d148dcb1f063abb5ce375896812ba1c976d3fa427ab3504d234