Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/08/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
dbbde9005d68027f8e05b0fa9812e02d380c0094c94c9ea018addc106129821d.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
dbbde9005d68027f8e05b0fa9812e02d380c0094c94c9ea018addc106129821d.exe
Resource
win11-20240802-en
General
-
Target
dbbde9005d68027f8e05b0fa9812e02d380c0094c94c9ea018addc106129821d.exe
-
Size
89KB
-
MD5
f42064313a47e9d301e8839a90fdb60a
-
SHA1
5e2d974d89717680a26a92568a9a08db944a02f7
-
SHA256
dbbde9005d68027f8e05b0fa9812e02d380c0094c94c9ea018addc106129821d
-
SHA512
38e56ee8c7cddd64dbce5c510e8cda753cee454271d74d1f481452f761e7ca21eba542b4094693f84b943dbfe7d853013e0292c40ea3fd69da2c1156f6c2124b
-
SSDEEP
1536:L7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfyxX5O+:Hq6+ouCpk2mpcWJ0r+QNTBfyF
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbbde9005d68027f8e05b0fa9812e02d380c0094c94c9ea018addc106129821d.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133686297416030842" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2227988167-2813779459-4240799794-1000\{C0E67091-B40A-4222-BC55-5E3F95C48F4B} chrome.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 1892 msedge.exe 1892 msedge.exe 2176 chrome.exe 2176 chrome.exe 6920 identity_helper.exe 6920 identity_helper.exe 5916 msedge.exe 5916 msedge.exe 6180 chrome.exe 6180 chrome.exe 6348 msedge.exe 6348 msedge.exe 6348 msedge.exe 6348 msedge.exe 6180 chrome.exe 6180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 1892 msedge.exe 2176 chrome.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 2176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1932 firefox.exe Token: SeDebugPrivilege 1932 firefox.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1932 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 484 4460 dbbde9005d68027f8e05b0fa9812e02d380c0094c94c9ea018addc106129821d.exe 82 PID 4460 wrote to memory of 484 4460 dbbde9005d68027f8e05b0fa9812e02d380c0094c94c9ea018addc106129821d.exe 82 PID 484 wrote to memory of 2176 484 cmd.exe 86 PID 484 wrote to memory of 2176 484 cmd.exe 86 PID 484 wrote to memory of 1892 484 cmd.exe 87 PID 484 wrote to memory of 1892 484 cmd.exe 87 PID 484 wrote to memory of 580 484 cmd.exe 88 PID 484 wrote to memory of 580 484 cmd.exe 88 PID 2176 wrote to memory of 2660 2176 chrome.exe 89 PID 2176 wrote to memory of 2660 2176 chrome.exe 89 PID 1892 wrote to memory of 808 1892 msedge.exe 90 PID 1892 wrote to memory of 808 1892 msedge.exe 90 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 580 wrote to memory of 1932 580 firefox.exe 91 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 PID 1932 wrote to memory of 4868 1932 firefox.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbbde9005d68027f8e05b0fa9812e02d380c0094c94c9ea018addc106129821d.exe"C:\Users\Admin\AppData\Local\Temp\dbbde9005d68027f8e05b0fa9812e02d380c0094c94c9ea018addc106129821d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AAE6.tmp\AAE7.tmp\AAE8.bat C:\Users\Admin\AppData\Local\Temp\dbbde9005d68027f8e05b0fa9812e02d380c0094c94c9ea018addc106129821d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffa1096cc40,0x7ffa1096cc4c,0x7ffa1096cc584⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1808 /prefetch:24⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2036,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2088 /prefetch:34⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:84⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3116 /prefetch:14⤵PID:6516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:14⤵PID:6528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4500,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4552 /prefetch:84⤵PID:5496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4628,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4464 /prefetch:84⤵PID:5780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4468,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4788 /prefetch:14⤵PID:5512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3284,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3268 /prefetch:14⤵PID:6328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3280,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4568 /prefetch:14⤵PID:5152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3128,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3244 /prefetch:84⤵PID:6228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3228,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5048 /prefetch:84⤵
- Modifies registry class
PID:6024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5048,i,1118011856905183468,3409857400916774173,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5092 /prefetch:84⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:6180
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd"3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x118,0x11c,0x120,0xe8,0x124,0x7ffa10823cb8,0x7ffa10823cc8,0x7ffa10823cd84⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1848 /prefetch:24⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:84⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:14⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:14⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:14⤵PID:6492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4468 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:6920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:14⤵PID:7144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4448 /prefetch:14⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:14⤵PID:5736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:14⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,17109216071947848545,15345869403564082820,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5692 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:6348
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd"3⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1868 -prefMapHandle 1876 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e75c297-3fd7-4f66-bea3-82ba5fa8eba1} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" gpu5⤵PID:4868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2400 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2388 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {360442ba-8a43-444e-a573-1e6acd1b6283} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" socket5⤵PID:2460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3260 -childID 1 -isForBrowser -prefsHandle 2920 -prefMapHandle 2936 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b09c561-4d22-4070-bc5d-bd1a9dd942f4} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" tab5⤵PID:4872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3176 -childID 2 -isForBrowser -prefsHandle 3188 -prefMapHandle 2796 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f50284d1-30db-4ea2-b4d9-62343afb5fa9} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" tab5⤵PID:5136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4252 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4244 -prefMapHandle 4240 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6939a9de-004a-4dc8-9e3a-0b46bbd9cd1e} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" utility5⤵
- Checks processor information in registry
PID:6076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5212 -childID 3 -isForBrowser -prefsHandle 5192 -prefMapHandle 5204 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e59d6b11-540c-4e78-9c5e-633da3896ea7} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" tab5⤵PID:7072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5364 -childID 4 -isForBrowser -prefsHandle 5372 -prefMapHandle 5376 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4796c083-b108-4147-b478-946a6972f4b1} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" tab5⤵PID:7084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 5 -isForBrowser -prefsHandle 5532 -prefMapHandle 5536 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87f47e77-64b6-4201-a8dd-da3cc0180997} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" tab5⤵PID:7096
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6376
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5cb9def622623742570c2578f569d9f02
SHA191af942133fb47e448dc636846c8e409317b5a3b
SHA256a2d3a825de457c17261b34d7f197b4a5a84ed541534f3381b0c71587143e77f9
SHA512c89773a0b04406c5763186bc9a7d271a899631f49e9df376feea3400943005f697ed19e54ec9a8049a391ffceefebe6cba118144b62377b217386b42fec73c9a
-
Filesize
384B
MD5908348a4ce55f20175c0293c75821718
SHA199f69620cf427fe1ebfc632c5a5d33d5d99a4428
SHA25632e977c9f5c657c0edec446b475ffb4728472262b2244636b84a9be2f3d17f68
SHA51236623eeff892e145be50b5ced1a8c446a85bce98cb76a1209354260ed142114420d6920ffe8e603f77a72140caa70b0ec09f6390405ff25c75dd61c2f5c71b74
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\0b9d84dd-4767-47ec-89ef-dca5d67b3110.tmp
Filesize356B
MD57d81122553f000194ee57426d9a4b093
SHA1631eae5f8c334694f087c9e96258b42426d18918
SHA256744d7eebbf049cecfa907cf6b580d59d8612eeafe472321f94e1a530f1569a4a
SHA5125bf16e87316326073b7aa9b836f1d0dd26c94e9f811b6ce53b61eb11e3df9e8cae697e0f50554f8375d43b961d9e1684400e97d8985637c41ffb147dfa60793a
-
Filesize
1KB
MD5d862521fde0b48eaf5563306a3094327
SHA1d1b3936d1d77a7216244837de833a14d216246a2
SHA25632367e0f66195c4a362fe67d0891def1d4afc6485e2b254b7928ea597e2c44fe
SHA512a212f96b581822ac1e2dcd0cc228f6d37915499bd0a536aa90671bddd663f85c7137690a239ceadda9826007e3dbe549ed2a80c4cc15e628df23fea724d9250a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD57a38093ee24560ddc4e967139356b5b2
SHA1b48e213a2f1746680975a013ce30b3558cad2906
SHA256578811afc075bbdffa63785ec6da567fa85d0681c142246cb32802793e4df7e9
SHA512a3a41a4de3c6309f9c05580111097a6fdd3f0714e74c6fee58688a4e903f2343600377a128246804ce46ee956b34782684e6eb2f3c197311db62437ffda38f4a
-
Filesize
9KB
MD54c3352ca1545cd46869f942200676339
SHA1c8c9c68dafc1452ff76ae069d35cfddca37f531f
SHA256131f64e0ca3959505f8d692dc27acd5ef6aef91f0405c4a666371fd468c82911
SHA512fb19862e158c6dc8881343e1bfef7be81061869c7317e37aa8dbbd25d7cce6dce46c3e6235e102d01f85ee24e3858aeec5ef2bb3eeb64d070b33048254585aad
-
Filesize
9KB
MD56850c320a01f5278fa13a6d66ea51a4d
SHA12fcebb1ba125cd5b8663088e828bb340f97056b3
SHA2561301310a6b400ec796d80695cb513457a7587f732608b671091c250ddd48c36a
SHA5128e29b51726ac9a2c979aeced2aa3cb6410423f291a94add8b467477147ff1fb4b626ffd196ec5f06e5bb5ae9690e9ea3b456894d4e0a9f772ddf6d695450142f
-
Filesize
9KB
MD5d661a03c7660ccd202f100243ece1189
SHA10650604b2ae31e66636b811d24c1a5e1af57ae4f
SHA2561e782dbd72aef970c6494433938cbf18ce51fdc35034337ae6ecb2b4e700654c
SHA512718f8521fff42f3daabb8d8793d73735bacdc69db7e921fc41aada44564aabf3a474a87269989944cc9bff6a9f1d0a05b6261026527bf5dc37aac5a6360095eb
-
Filesize
9KB
MD5840959de45b102b9ac9d01dbbaae316b
SHA1ddbc25839fa02a6a0c54e364b3c0b0aecddb02f4
SHA25667070cda7c27af05480d47889cfcccdd89dee7aca588dd38203b978e5691ca4a
SHA51204bb659920971bf3c21eced188950a22b5937226f9dddc089d609add127e48e59e0b46b16e3f5c4aea321c78ac190658e26ea0bd9c5da9ea0098f5d14ec24c49
-
Filesize
9KB
MD52d44220581f0cd210beac31cd66c1407
SHA183a1bb7b4d5b7df3224b00f2bc54d2d496fb6d75
SHA25602d8f966dea82d6fd08fce852d3a08f95a2185fc4aebd849be18ea84c66a092f
SHA512a41c6012fd28913a7304cc9ec2af946ecb44c983e45c207cdd6184cdb3d25b4f0eb57e0d119eb34f7d83017d4beeb0675306cdbecce09e9a9175c1ded8093656
-
Filesize
9KB
MD542c9ecdc0530dd611d26a586c8b33da6
SHA142b7efb70a85848d25714b2ccaa2b8a45f1f353d
SHA256d1837a8265e9d9f62af02ac552e7be500c24b47ef5ba733ea116e2ba636deb12
SHA51278a30f12d3ca2be4dbf46a653c2e7c6e3cfb59e8513e9ed17765f09636266e5b4880026497d48ab75160e2041f646e94b0a26725323e10dda080d33007a1850e
-
Filesize
8KB
MD51529867c96e4fc60439d040bd696b814
SHA1f549245394987e9ec675027be5fdfe8045ec83a1
SHA2560294b3ec1a01b89869a327d8e75b52825ae6fd0007080129b35a512afb34bcc7
SHA5121ce4759b5cabf9b2273733faf79ed700aad47c91a9baf04b4e1c80afe683e7a84aabe53571fe0ef5edeadc0d3b81d684d3abe034aac812dfda12f4ecaa7e081a
-
Filesize
9KB
MD5edc570b9a6839262c4208883fe652ccc
SHA1ea9bf3be9e9f41e304b3d5b1eb6e88ce08e71eb0
SHA256b7e63d5d055673b03571740cf6d7b567b14216dbc12b3f70df6d2fc6a466e934
SHA5122051fb0fa058b0b7476cd5cb8f796a12b22d064311f21eb13a8c644a1000d170f4421a16f6358403993d0a56c1b35c11638eb2ffe6bb4992e105c5f0a323640b
-
Filesize
9KB
MD5bbf596bd7ef110539b1390872db6340f
SHA12fbc1e9c521099f2957a7231dded27b973c9378e
SHA256d3588d616a33dc0bfdfe948c3af7c6fd0758863e7d898a1335ce1672ddf807bd
SHA5120ec0b27df433d6ab0c91d07bcb9b1334182a337e3bd11ddfd665dc44a4435d683a9e646967fb798d5959847593254e7fbca8158372b1975f859c2c540c009903
-
Filesize
9KB
MD52b858299e5170ebd78aba340408972ee
SHA1b25a6246ab4e9f9afa2b038befb489ab043287a9
SHA256c52a62629fb1550b97c86ff3ca77ad1f8ed9fe09d60cf0e1acc55ab7338bf805
SHA512e8e5af3a781205508bbff74b8060e7aec79b437f944581cd6305b506d236b198254efaec38466ae441123eb08e10be1dc6ec98e006e3e67bd3940f826510e9ee
-
Filesize
15KB
MD5059ea2e2bc0c1a9ceb56e90c70766c4c
SHA1a2402b192b24e44e7f2c993c099a2c20239ca60e
SHA2567921cdb561911e57bdc7edba4c8da76d8d07d9251507a34596c1f110613c3046
SHA51276eda74ded049f890467808210b990cb5aaca15f741dbfa95ed328aefacea75bb1ab3c77c00f1e9a4d7732acc7da6e7d1f9fcfca68d2d43afcb52e2cb615c1f8
-
Filesize
199KB
MD5c3e51559d3ee63ec92f91a13a7ab577f
SHA1360e9339286f0f69d94b81d606b4c5c071002092
SHA256afbb6db78ba90e84be6ae13ef73d0a88f09fb28a5ed48eefa26bb9975f3938b2
SHA5127335f47a81ba3e6cf3b64831a2f770503b80cb0bdbde423faef64e0cb938d57b42d6513ca32d0f13971d085983efdd4c5d92f319901270a4cdcf4507356a21ac
-
Filesize
199KB
MD5dc4af688315c9d18923620f53650a64b
SHA1a56ef9ad47e72219a72d315d54cf0e6ad3ff83f8
SHA2565232525cc2708aa489960b486b6a5b9d9c769f2f701b13be966eea1385055086
SHA512ccbb60beb7f78263bc9199dfcbce70bf8d626cd7ea9c73cb22138b20366ad5e77cef26b8502e4855546f3c39d4e52fc3501e3379a233eb47c936a2c405e3ee17
-
Filesize
152B
MD53e2612636cf368bc811fdc8db09e037d
SHA1d69e34379f97e35083f4c4ea1249e6f1a5f51d56
SHA2562eecaacf3f2582e202689a16b0ac1715c628d32f54261671cf67ba6abbf6c9f9
SHA512b3cc3bf967d014f522e6811448c4792eed730e72547f83eb4974e832e958deb7e7f4c3ce8e0ed6f9c110525d0b12f7fe7ab80a914c2fe492e1f2d321ef47f96d
-
Filesize
152B
MD5e8115549491cca16e7bfdfec9db7f89a
SHA1d1eb5c8263cbe146cd88953bb9886c3aeb262742
SHA256dfa9a8b54936607a5250bec0ed3e2a24f96f4929ca550115a91d0d5d68e4d08e
SHA512851207c15de3531bd230baf02a8a96550b81649ccbdd44ad74875d97a700271ef96e8be6e1c95b2a0119561aee24729cb55c29eb0b3455473688ef9132ed7f54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD554ae4593ae20fadef5ae8bf047f7b4cf
SHA16fe722585a8ceae1f72bdf76ffd362184124beca
SHA256505f5861c64bb4cc98b53310f7c997cb33654840ba97fa5bfb0b85b26f61cc15
SHA512022ddfc73ea6170ff6994ac0b3038f93773d70d250c3e5dd1aa42a1bb5a85c62166056d3e8127acf4d48b2d0583e394c9e5f4ffd174656465f36bf7e10f351f6
-
Filesize
1KB
MD584be533c773f2594a52a2c89ef37db44
SHA15611a829fdbc4ee69f583799aef9bb4fef9524f4
SHA2568cf63d1f4d8d834d741b4a3feda1ae1603c74c97d9edfa197ba7e8cf64aee9b6
SHA5120534f87bf9a7296accf3b910d43d3ece45029a67a523e4053fb1e4feacad03ed82326a6628e76f4e2d9c196972f9f53dcdf1431ef7883b449ee5ae607a0f918b
-
Filesize
5KB
MD5489ac8bbb0265dce951bc0028d333922
SHA16ccdfd4bd6146b79413b07191c68701639df79f8
SHA2569ac2604afab0b5265523214a9a10c7da34617a45da670daacf2016d84ccc102f
SHA5121d4003d3482e5f82a7e7ae053d6e5ce9d3f8e74d15233b299daa2f0a16448ded809a7b39bdbbf2450a8cf5743ec81f83176bc4b821e79202c23fa17e37f686fa
-
Filesize
6KB
MD51f90502a1e6dc2b0b0e894cd88413c59
SHA1fa29fb549e4eb757ac4747c266b2f7ba425476c5
SHA2567a97332875eed0b04d99deb3dc3393c1f70361a021234d37803777ea3773840f
SHA51233e685242713f21021195831099c66b5497a73050a52a9881fda773b66674ee33a48dbd9c49cc341c736a3fb37c60cf6b062ac5d6eb9f0e6b7b703b01c7ddc7c
-
Filesize
6KB
MD58e971ae7990e03b12510e35379f9b82b
SHA13f2be5b510339a0a2d99a95f4ce6a32b1dce8af4
SHA256468debd19ce791812583902366c41834b41bf0b5506749c519813629efdecd93
SHA51252df096108c81ad96021f4b770858efc0c42a8d3fd598f8ad728cbbeb5eb2e333dd093533cc2902c3c50af1f3d35b2c094c0c3147956556f3ea9446baaa5376c
-
Filesize
203B
MD54314ba0b36ad97abd1b800c4dc671254
SHA1a9627e2a67c924af5f78fde92881a5dcd9e4586c
SHA256a7f8410b00fca70a14065689cfb834157e54b3b611f4bff9b9c017459c63f19a
SHA5127afbde4da8009bdeb3c17223569b445a997d58733b09ccf2a6a226becc5a1b549568c0ea9dcb3176dced48b69041845a1b487d1ed400700b5cf9b3d55452ae2d
-
Filesize
203B
MD5ccd089421eb68bf94834e4c2eaba806d
SHA101a412b368dca7f1461dab914c566defe3507d25
SHA256064df5513ef961c89b862506530b2f9c649370bc380da9256b3a9f5d1a3f5858
SHA5120851752a1543687bbc9079eead4e29fe2184c5d26cb43229cae26d3deb8212eb1409c20f139edad5ddc64f4bb7748f4e1213073135f2b091846a9d38e98eab30
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5580844b6a3b54389ba0cacd9f712f32b
SHA108c4d6cc71ca3c00de6c1bbb063973f188dedd3f
SHA25622ca700aa48e97505f969409ff9ff5817a7d0a4d3f3876e42ca6dbf7135b3f79
SHA512e595ca12233cfbcfc9a3276fcea531303f8975eb7e40b40b6dece0f9c0b4cf9596ca24f53007e6e3ca18ae9d280a3f27de14aef15d6d646abbfbebb6ef807a68
-
Filesize
8KB
MD5b2701ac51296a09bf0199ef8127060b0
SHA155c7b55f2be4519ca6f8b93c0ef03ae19e9d4a6f
SHA256e649fc0209048327bbc15de1933b90912bd0497638413e84dfc699673bbc0634
SHA512e685642a74693dd9f72e8b0edd77bb9cd5798d0690a3e194db8eee40c92b9f9dbb4098e275c6c1202c7d735cf7be0d664d5ee82ad4d2d8a3ba1317e5fdcf30b9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\activity-stream.discovery_stream.json
Filesize30KB
MD543c5615c85a1808a3c6e6ff47f809f81
SHA161b86063adb444cb3657025a840d772d9f84d87f
SHA25638059dcb06f25fc118f2cdb2408d35f75a7f71c25923a5a542c34a1acd83c3d6
SHA512ad4c654b380c0515272585586d129b4d8b05286ed623669b049ec2000f565d3ed9680613c5a44e5c631f1b7e34e2b30cd1124539f4dc6bf228416b95cae0873f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B
Filesize13KB
MD59ec4345df946281283de62781c1809f9
SHA1a9f593056cf411cd50842ef8ca2c9a7d77c96a62
SHA2569b7e5fa7c564cd73d8dc59dfa8a9aaaca718f7aae95effc0e04ff70c37f88f1b
SHA51257ba13ae54eda08bf5df9792674addb0e7824204f59a72ed6b2b6e2405e129ed2add9f2ce5c10fd6c7bbbebf33c089c667010833a3917b530c4c95bd9f48ddca
-
Filesize
2KB
MD531c09b550c61042384ef240a1cd226df
SHA1731fbe63179f646915f8fa37ca9f8c85fdb9b48a
SHA256752a176e12900c9f3cf947bc36d506e360f86da00a2dbc1e5fa821f2584c75db
SHA5128fcd654736e4b71765b5379c6e1699771e83c5c1df1b5e3fa7f74e4d3b5629ffa1f54aaedfdf9979416d3704bcfb38d73dba7c36c7b6f1ac9804737e7af698a6
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize12KB
MD5071ddd4c0c3b06496653369b7c7a4277
SHA1e37b9405d2b33014d7cea26c8860dd0f68f161bb
SHA256738b675236035afe34a7e5192c6fe31de5154c05c16b2f8f994723ccf8f8b320
SHA5121ec4e41fe34c06147499bc267b56f45b4415660087b949353afcd03a81ca0cb1d20fde5a5385e7d762e6b7d66944347b3aaa6da11a8c13af193a48a36eca377b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize11KB
MD591747591a95fb821c523aac672be1f13
SHA132d41858cc6a2c5b32e955dcbe770d22c812b091
SHA2564992b4282303b4dc1ee75186cabddf6c1582a98db8bb801afac73fc7d890f075
SHA5127a6a0181d22e9cfe6470873344c54f7d48210d5931e3bbfca68772f16feac6ec326277f55477525483ec6b905e0e63833e0c3fa9428cd570a8ccf8a9072fa184
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59f609d6ecc31d5edeea3b457bc4bffb8
SHA156875c008b5e0c8eb818050e8c2915e93a17ac39
SHA256479e391507c80882372349c0e50eb0bc48ccfabefb9a59655e4c0a3727c202ee
SHA512f75e9a122dfcd5495168d7694258dca7114a4614d30c31246ddf08da180b6eccfb9921148e5a0df3bd8b1c7b2805f163f052f641729872645ed506afd42b1088
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\32a476ff-340f-45ec-b338-6327bc3d2b56
Filesize982B
MD538f29012ef24ebcac8a681591aa9b250
SHA130f7e0dd821f2a3b8998f90eda97732630ba7a08
SHA256659f938ec3c0135422c519aebec16389a2b1b252020cc7e7bc3aa18002cb2f78
SHA5129fa79e11a8095509d073f1c09721af0fe7fc96f2fcdae4134200c4ddddec4e2db94da961a0865b62062c5d1ba36682c34a54b8c85454f0739ae7d5c42fe40825
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\9a189cd6-2272-427c-9ca2-fa8a16c30c0e
Filesize671B
MD5376af31df4db33c57d42bb00a6cd8a90
SHA155dba34e12c4f48627f4572fdb29f339f122490b
SHA256ab6d049ca23baf93623f95aa325202de4970147b4ecb98a6139557a1f257831a
SHA5124e2e33be39013b1427a99961af42f7972fbd21943e06cc2424ba22ffe03d0c424632e70150198161f6ac3e7f57a703fd4f01420870611fca766188fc61634f88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\d4da14d9-561b-4393-97ca-edf0f9e9327c
Filesize27KB
MD58aab4d0bcd3a97f9380db83b4f37f22b
SHA1234142d0b0b0b6aa38f1743a0fd7aff3eb438cb8
SHA25643ba30224249e3165aaf5450c9644f575ca764f93959f12923e4a3713973c23f
SHA51224c8990c47f97ad31dc8a92934f35ba75229e6343c8319179c194a1bb5a4f692ab3b1ebb215022127ac3192cb213476906c0ed920b83ed5873895882a8f63d88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5c704ccc25deafcaf5e60451289049825
SHA19eada79988b9243ab7a370df3126f6f9b42d022d
SHA256d48523e32b553f56e6cad655addd7606e94e284d02a1e55edb255a1329ea6019
SHA5126771605fff572e1952c61b15035ef572c8c50a8370208a76c0cb654b33a5653e91a1abca86e061e2b6b12a60c1080848e7ab495e57a6dcb341c12fd82a4fd7c6
-
Filesize
12KB
MD5f1ed88b73685f03bb88f9617f54154f2
SHA12c83b020ed32c7d2af46a2ea5895f3fbb1968617
SHA256d8d93ded24d6c38f6aa966ac3c69ce99d7e136c6290bd6b2f90a7a6928f6c20b
SHA512622736469f935beeb58626448492f4c2869c2bac5bbcdfb278e092100eeed449def53fe646946a73a0c6443356f60cd14d07a5eb679fbf1c6ef02d5e24bff921
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5e9d175a9d88951b380bbee5c52a146c8
SHA1d34d64adb2f7c10542038a7062ecd9ea0558ab33
SHA2566528cf5bbbb1de5819987b983d78195df9ae693957c01b51aff3f43f4d8f472f
SHA51286e61772b2233dcaa5289b23e7f90df025880d5da6bff71a99e57a7bcf2f9385c9a2397f6246777f0d19db4dcecfac03722c0482fb526de1ceaf1f16b48f4252
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize648KB
MD5b3475993be5fb9d2a275ab13d113d756
SHA17001e0e189de0aab48808f3436373cbc672bd353
SHA25678c0d8ca91d1b3270a249d2415b75b02a456d84262d3ab6d836e9af493ed4f70
SHA5123d18052ffca037331ea5823c33c984adb1cf9c00c2bdd615e81be01aa1b60f09df4847d16903d9d1ab6fd87aa99527175e57014f164e489649004404faf3da5f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.0MB
MD5776be09f129513048dfa0172f4385900
SHA1fd26be9e6be6ce064e5d1fbc1409f6876b0b5074
SHA2562b64e79dc0985ae9f064c7f6b1bf4429415113463b661fdae7adcdbb594a8de7
SHA51211f6c8c8408f72c778b5681b9f90da5088412920d566eea7184455a57c00bf89b289fd61299fa1904958f92735a4f56e85c6d606b5d257f2af9ef64863117a83