Overview
overview
10Static
static
100123b26df3...09.exe
windows10-2004-x64
3022432f770...03.exe
windows10-2004-x64
3048c011323...59.exe
windows10-2004-x64
30c722728ca...56.exe
windows10-2004-x64
32106b6f94c...fc.exe
windows10-2004-x64
3263c18c860...93.exe
windows10-2004-x64
327e02b9737...77.exe
windows10-2004-x64
32911be45ad...7e.exe
windows10-2004-x64
1047f3c8bf33...b1.exe
windows10-2004-x64
3516c81438a...4e.exe
windows10-2004-x64
35d66919291...99.exe
windows10-2004-x64
36204957505...75.exe
windows10-2004-x64
37299026b22...69.exe
windows10-2004-x64
37322fbc16e...b0.exe
windows10-2004-x64
3960ce3cc26...63.exe
windows10-2004-x64
399f510990f...ac.exe
windows10-2004-x64
39ee50e94a7...42.exe
windows10-2004-x64
bd8c106856...9e.exe
windows10-2004-x64
3c6e6698065...9a.exe
windows10-2004-x64
10e309a7a942...f5.exe
windows10-2004-x64
3f7b1aaae01...27.exe
windows10-2004-x64
3Analysis
-
max time kernel
600s -
max time network
596s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
0123b26df3c79bac0a3fda79072e36c159cfd1824ae3fd4b7f9dea9bda9c7909.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
022432f770bf0e7c5260100fcde2ec7c49f68716751fd7d8b9e113bf06167e03.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
048c0113233ddc1250c269c74c9c9b8e9ad3e4dae3533ff0412d02b06bdf4059.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
0c722728ca1a996bbb83455332fa27018158cef21ad35dc057191a0353960256.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
2106b6f94cebb55b1d55eb4b91fa83aef051c8866c54bb75ea4fd304711c4dfc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
263c18c86071d085c69f2096460c6b418ae414d3ea92c0c2e75ef7cb47bbe693.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
27e02b973771d43531c97eb5d3fb662f9247e85c4135fe4c030587a8dea72577.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
2911be45ad496dd1945f95c47b7f7738ad03849329fcec9c464dfaeb5081f67e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
47f3c8bf3329c2ef862cf12567849555b17b930c8d7c0d571f4e112dae1453b1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
516c81438ac269de2b632fb1c59f4e36c3d714e0929a969ec971430d2d63ac4e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
5d66919291b68ab8563deedf8d5575fd91460d1adfbd12dba292262a764a5c99.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
7299026b22e61b0f9765eb63e42253f7e5d6ec4657008ea60aad220bbc7e2269.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
7322fbc16e20a7ef2a3188638014a053c6948d9e34ecd42cb9771bdcd0f82db0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
960ce3cc26c8313b0fe41197e2aff5533f5f3efb1ba2970190779bc9a07bea63.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
99f510990f240215e24ef4dd1d22d485bf8c79f8ef3e963c4787a8eb6bf0b9ac.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
9ee50e94a731872a74f47780317850ae2b9fae9d6c53a957ed7187173feb4f42.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
bd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
c6e669806594be6ab9b46434f196a61418484ba1eda3496789840bec0dff119a.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
e309a7a942d390801e8fedc129c6e3c34e44aae3d1aced1d723bc531730b08f5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
f7b1aaae018d5287444990606fc43a0f2deb4ac0c7b2712cc28331781d43ae27.exe
Resource
win10v2004-20240802-en
General
-
Target
bd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e.exe
-
Size
55KB
-
MD5
16bae91061e6410ddf2c17b544939d87
-
SHA1
531b6c546b26eeb9e33560292bb756b47affbeaa
-
SHA256
bd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e
-
SHA512
8fa546a1ab78a43f1feebe009d7d578242c3f1a96778588a3086b69a1bd58449a563d99114cbbad94c840f1ca8469d26e9c6e83d240ee0d472bb56b6dad4422d
-
SSDEEP
1536:qzwshK8pUMGxo0xwwW9VemFMGfpbbVDMANyCa:wwshK8yMexbW9vJVDMANs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedge.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133709132556357718" chrome.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
msedge.exemsedge.exechrome.exemsedge.exechrome.exeidentity_helper.exepid process 4536 msedge.exe 4536 msedge.exe 4092 msedge.exe 4092 msedge.exe 4892 chrome.exe 4892 chrome.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 988 identity_helper.exe 988 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exechrome.exepid process 4092 msedge.exe 4092 msedge.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exechrome.exefirefox.exepid process 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exechrome.exefirefox.exepid process 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 2264 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4092 wrote to memory of 2928 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 2928 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4140 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4536 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4536 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe PID 4092 wrote to memory of 4604 4092 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e.exe"C:\Users\Admin\AppData\Local\Temp\bd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc28a046f8,0x7ffc28a04708,0x7ffc28a047182⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2312 /prefetch:82⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4480 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4953419589795624133,14221139867511907775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2184
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc16c0cc40,0x7ffc16c0cc4c,0x7ffc16c0cc582⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,4046307451243217494,10048163041933085797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2112,i,4046307451243217494,10048163041933085797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,4046307451243217494,10048163041933085797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,4046307451243217494,10048163041933085797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,4046307451243217494,10048163041933085797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4616,i,4046307451243217494,10048163041933085797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4548,i,4046307451243217494,10048163041933085797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:5940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3160,i,4046307451243217494,10048163041933085797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:6140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3640,i,4046307451243217494,10048163041933085797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:2684
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1860 -prefMapHandle 1852 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c020a4f6-e536-4b47-9374-31fd66640d16} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" gpu3⤵PID:3688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2372 -prefMapHandle 2368 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2672757a-95a7-409b-a030-c14d4b7765cc} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" socket3⤵PID:2948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3024 -childID 1 -isForBrowser -prefsHandle 3132 -prefMapHandle 3128 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b0cd2f6-fdda-4d34-8159-5cd3905fc989} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" tab3⤵PID:5464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2936 -childID 2 -isForBrowser -prefsHandle 3592 -prefMapHandle 3588 -prefsLen 21809 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c956092c-4f13-4cbc-b049-30a172196932} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" tab3⤵PID:5420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3016 -childID 3 -isForBrowser -prefsHandle 3728 -prefMapHandle 3732 -prefsLen 21809 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {23031de3-a688-4713-a559-746c24081e02} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" tab3⤵PID:5532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3840 -childID 4 -isForBrowser -prefsHandle 3848 -prefMapHandle 3852 -prefsLen 21809 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e6f2079-6f95-4aa4-91de-5f14eba07a25} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" tab3⤵PID:5440
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD58e0602c0c9253b73d0fc757472e564bc
SHA11319c7075d68d83811e46438e8838712f3f1d47b
SHA25694068c1b78d47e6c9ae90720bf4f3f84984e8f4f7613d9d377e77fce3c8f98dd
SHA512a8467836f9110d96ab189bae914d8c5fba18e5f46fedcf95f2c38b65a37b4b1d1a354e67b17bd0b49237a8021cb1456a323c30b9a0c246d1f0580ddab43dc160
-
Filesize
1KB
MD55fa78b2170ae91df5859eb8c1dae15fd
SHA1c09f8c6233a4ebaf331ebeb5f09fc9121f840d49
SHA256ec1674ccdf82cb7d275524fd8b03c7eb339a05c40386d2d3df56013449a72374
SHA512741c1f24b2121a81c552ca26603a07e517ca2435b1d695d158fab444c3c1cc7894f4340e5c45bd72c57dbe1bddbdbbaee3e23a825504b483c68c50dbca10abed
-
Filesize
1KB
MD536687b7c4b5134699f7dd62f32b3d213
SHA129d0b1ac954ef8344d2648999c79955989ae97df
SHA2569df16aa112b94bb8d57eb5d5c0f718ad2e48e80ea8e00953bb9e76b89f3469b3
SHA51249de2cf6f2f96612bf0ec784aa09dc30a2c46e9d44d221a08fb8197009c4527010308b9eb88f8c73500ce2dce0c4a772e0f285c2d136445badb9213a83c92848
-
Filesize
1KB
MD516f7dad9e982fb972fbb05f2e016d0a1
SHA181bc53c926b3f9a37ed5bcdd3f86b94e7023e4e6
SHA256a22f921ce65a7f01ba6847661406d1bf3aad79979ac59872bd132de132210a7b
SHA5125e9365e3da3c49e3ff9c957022a0e8e63026529f05ee2121f55381be859141912cd3578e1d11f99fe53b84d4b57b0be40d04593e6d03fc8f7aa3159f4cac1331
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD585e6358c9e4f71db2b582f64540fc56c
SHA16b372f49a5d20567251ca2993316874091efbf6c
SHA2568b4a9fc47daad820fd865802175165bea9b034d02ac388f60d34f4b112dae2ab
SHA512bde37d647ea67223137cffee09e8f85e3fdc1a7ad163a33eebc463ca895942893929fb6ef6ad53fec8d99187436edfa45dde1afe737c8b094e7dbd64f52430f7
-
Filesize
9KB
MD5787d925310c657913fdfc820eb05a696
SHA1a862f36a44b33fde37c81b6d4de20f2790becca3
SHA2568fbbe2412a012f2165fa5920249ff71d65f05405a7b0ce4e19bcd380e870bd9b
SHA512009f8a19cda18d16bd619830fbfdd411bbad212235ad30dc33b86965c9788a92a098916254274150e95b4d0e9bbff3fc44271607244bc19a781a84cf87b30346
-
Filesize
9KB
MD5b67822547aee8fc4d6d711a651a96f5c
SHA151fa05d5138f51bffa263906d8df27fe1aeb0287
SHA25614a95eae865b0643bb308bb52f28a294f4bb40691b0de07d9c915fc86b7d0bd6
SHA5125253910cfbc748308e0cc71784fda6acfc25a028109c1c6ba66c4743012f5960f55f357a0e0baec1d4a0d9fc45c9bc1b25a834aa4c0796f3b94ca7cf2832b5c5
-
Filesize
9KB
MD5053beffbd31ce25176291000092a8efb
SHA17121864e6b01ab2b18bef7decd331d93bcd7df0b
SHA2563e5693f0ec518fae22423a33bef512cd8e65abb71f98aed97905310c287336c4
SHA5126f0f4e82326a4c0147c6f3869f3c18aadefc6782d51708c57da9ef3d430827aea0a1d29ca70d13930d61cf61929da95b04bb4a3686141f334fb8084319065833
-
Filesize
9KB
MD56733a04c9c7da0070088861e5add521a
SHA1f1a4bd918e7b3311882220693acb90f0bff6a132
SHA25626676860d7d3ed69f39f0146ea3ab96714467eda1184dcd3d8f13658267ceb47
SHA512ebb57bc2695158ffdb7b8d0e6c9ceb39e1d294492cdb3cc350b8b58245aef6d3cd07fffaa18a150eec11ad4360413cc024254f4a55dd118d2c8204eff6929a64
-
Filesize
9KB
MD5e6c2ab13f21ed0993adfd295f67d3146
SHA1ec38045b3ace96fb04a23bc7b27ba7a48ceda599
SHA2564abe53ba29c465c12c6e7c4a871befc130978c0a92d306a53391b7a3e8872680
SHA512bbbc7919bf01681d95da22b1bb4119ec84849d134683fd781b6601d8e7ed2d75fd015d9522a2ad1a71251d05eaec9435b29e7534982eb57b3b396cc0ef5955a2
-
Filesize
9KB
MD5742b5b44e9a72fc7623bdedbcf6526e6
SHA10c9711cf7e270395bf60d69e15931f2c3b94f691
SHA256287efdc28393938c3024dc31e1398dbff13cbec0329290b062756316796ce5ba
SHA51222ca1816d4dd019654bdb2c7feb24d91ef1d5efbede0c07412b63dfbaf66493b76372bc84100356b8bb1250577cdd162fa91c1eb3e47e08d84a15577ffc783ac
-
Filesize
9KB
MD56ef8d68355cb25eaac057edff39e0140
SHA1fdb7b5de18adf606d166a22c68d2118c82cf865f
SHA2561af685242bd27103479114ba1063e0b788140a6fff33003651d8ee5d2dc32d95
SHA512f616e353edbab50428c8f3c8732c92dd37f7568060aeaf882f87f1ac3f93030e43b97c1a5db2ee84feb498e557b21d1c7b7f00fe108356ebdd2acb8b9c3db88d
-
Filesize
9KB
MD5ac61b27c710d34e49feff9a20577bcdb
SHA1cc46dff14721aad65bcaf13add8d8f2acf78ebd3
SHA2560b23c06d8564dd400d91bc40b72045dae9a37109757c73f8f08bb59abbaaffc3
SHA5126b48288f423b3cc68384e39eb9d7e2c124adeead275fe66ea693f5de0e4d8ccfdb616c59dbe50002eb21df94e53a1f5472ff7dbd1a6694d4ad8347023713c7e3
-
Filesize
9KB
MD5a37ec8ff22ee5907c936bf59367262f6
SHA175c7080de269b67a55194e66e50425bd7d4475ad
SHA2565ba5ef1d31566ca3ff60c64fd6dc7f2de0834c6fa6916d3d88b544189c3ddcff
SHA512b64f801cc17fa862ce5035f29a9b4719da8ec44445659ad1a1f8a56e70a97b061ffc620e722fd0a0640b1c47b3090fd4db1385cadb13eff5501ec88a868de22d
-
Filesize
9KB
MD5df95d0cb0534f00feabf67542731f619
SHA17bb73c883c0041bee39ddcadfd23c8d0b236dcf9
SHA256d3057715236874c2ddc69fbb4a0bd7fa66700c2804a2ec8c732e1927765d38e9
SHA512e5c1881164f735fffd77d825bb4bc62baf3bfd87d7a7634dd67ef9ff8c0b91615883ed6609e655758b6050fd506d9b6f3e4a6388e87af5de70f5e9e6d76dd224
-
Filesize
9KB
MD56b21f1431f40c2ec2bf507db1073aad6
SHA1f438451b7fe33a8e00d93ea16b9635d214bf0718
SHA256c1f234388a4c258f531ef3e4e93fda0ae44b73c517f148b74683b1c31c9f71d5
SHA51268071401524d1a80900434abb4b39c6ce6f328fef49ebbf5888a1dd1817825e5579c5c667ddd463292cd01c0b000851df94020df20bb1896fb9603fe0ea1bcc6
-
Filesize
9KB
MD50d4781e46e739f5bc7e6a4392f5a88eb
SHA155aa3b68775589f194c4018d9651cfb2a4628996
SHA256cb7d85ae4a2b5486614db6f5f9ed0e575096d93b45b3b0599c54da73615915bb
SHA512cd07a12209e6d043ea7c78dbf907151c53af7d87b5a906fc2336856df5bf56eb62ae7c837ae7788353fba94d25ff07c8ade68d6b88170263006f1eaff2a8f44a
-
Filesize
9KB
MD55b48581d0a51385ea2e845c22ca83504
SHA1ebf27bf3bb51d521a64ffc5b92f2861c7f6058cc
SHA2561edf9fff7fc572d852e20293be15146604777e6f9198711e3a0c04a8b533369d
SHA5125e9e94a5c8d8623a1667b07017cbe35b8880274ba6e9176be0faa96245eb7a3c9e88c5259111804c42f216097d6f66c11b23b6c36f26cb2c3ed6d7cc2d1f029f
-
Filesize
9KB
MD5549b8deee87abb233775a866dd7089e0
SHA12bd73ea73d1190c658bbfb3e506d3dc5e9a86578
SHA256895b7f90008c3a2d8e1bf8a988156c2b8ad082cb28d552916fb2ed2d3f379b58
SHA5127b71fe9222441fd0b2bb19408a28f8f967a648da42ea716e2054dcc07502a5d305f7677c5ef9ce4784b99a37d9fffb72cf7139ce54e7bcd868f416c4700c5cac
-
Filesize
9KB
MD5384ade6df2c897d2845b40936d88948f
SHA174893695c76252187fc7ba82f8babe8ed2ccb0dd
SHA2561bdd260659609d28f47d0dd081ffeb25a8b8442230ba482c658ea3615a130cd0
SHA5129e7806b687576f4d8c4e0a554c53292a95e5ad36eed56db6191def299b04782dd3eb7357019d29d7aa9fe4cbf878143f5e30bd15ad9bbfc0602feda25f32c9f9
-
Filesize
9KB
MD53e596141ce10b412579a3870c5ed6429
SHA19b0dfd2b5fef9f236d76c13fc50e50bb4f0f8a66
SHA256624c82e9399a5ca000223f60bb8bf1cdca088428e8c4dd8252f4aa9037711c58
SHA512e9756f6b597ce1137d3361b9e9c1b761bab5f2d2bb4afe8a1bea0078ab2f6c3e7f6ea68d207473897f19aeb3245a3f02179090c29b4c470fcd7bbedc535f45a3
-
Filesize
9KB
MD5fa76375ac4a43ddb2a93f427da49922f
SHA1ab84647fe4d3599cbfe8eeeda7ffc28a3e1bf11e
SHA256cbc54403dcdc5da017c253a3ed53ba0986db6a049dd8ac731529e5dc1f92729e
SHA512843802cd098034bfd10298554d455c4df43e72d8dfb1a5bc036a3dc2502197b160ad91dea638f014ab30f9fbedc670287ae6b7af33b6dc98cde1cd19b9e86ddf
-
Filesize
9KB
MD5c4ae8f979b20eea4c818be4f42813269
SHA1f910423fbafcaa3cb061cc0abfb472b3021305fb
SHA256f2ec510490476f3901a77e57b12b2b2fc05b7253688bd7feeaf4d6a4908f3ba3
SHA51248e9ee1c1d5e9bb763d85a85ba8bade2ed5049d7696f75f22287a2efe837233564a5fc7931eaf1f5863a6878b5b12c680cfd159d76a05a9ab5eaec0ce3a8e92e
-
Filesize
9KB
MD5a6b437e8b4810c36345c03d13c29c645
SHA1aae2108719d77c4ced8ca45b3a703ee5a3d70619
SHA256d038de12c8053dcfc42aa3d0697fce6451b1350c97707287f03112b0fe17c204
SHA5125f745f77009b78a980d51bb55dbc1102974cd646de3fe335281224b7315d88ed78f99d6f519e0aeb20a98833e34bfcd0ea5660cf7454dfdf6ebcb37f2364416a
-
Filesize
9KB
MD520e44e5f953ea74477c763fc740f8407
SHA1c0aa34a8f39dd162cbfd3dc8adb4e7ff48335a7b
SHA2568250631b8e7a5f16173fa839dc54b8a78802a0c9e6d4133aaffecbc8e2aebda1
SHA51282fd826cf2caf96f1ffb879b63f45a6507206c3f403bbdc0aa44ee5988ad0e07f356630945b4e0120eb4a87c95cad771cce9c81f652c34b319b81dcc1f5e2e21
-
Filesize
9KB
MD552a8bc4ca25adc4f79a7330c81acef6d
SHA13f379ac6e236fe02557a97f6fa3e2eda528a4926
SHA25680695462448ac25056240cca7dd642bfbbd30269dc1eb424969de4c636050dd1
SHA512bd809e24c42a780d6f2cba258f73ace3bc025911c3e99df2c3943193984e70630a4aa139906e45d787db9c4149ea21b9dbd090ecffe060d270b68ea29cda011a
-
Filesize
9KB
MD5112da132d4a3dd9b14245ac87d8fce69
SHA11cef0111bdd57bc8ce1086c00c8d84c423fe56ad
SHA2563f87996a19036bf2a0af12a38800380b1ade87cf3656ee8ef37da9966671a108
SHA512775a38cf7718cf238bf2dc9f3b78b93bfdcc5de72874671358def4fbbbe6fc8f571560bb1d2aa5ddd1dbf8f1e82270099a8dcac8a3dee1a699d7a9261f3bcfc2
-
Filesize
9KB
MD5aae33311c86ad060172bf8c20058392e
SHA11a46b85a0af309d561a5004d4b49057bc16e36d7
SHA2567c6ad8fe117e649934d460803878e3e64054318bdac0797966368a5270efde7b
SHA5123f8131293893972ceda9a6bbd7b881ea29893da6589b990df9d16f5c657c4cfefe8f67043b872e286165378b3b6b01864d6403a249c41be6ac2bca976c24b1b4
-
Filesize
9KB
MD57ea68f5cc96f409b877cdd92a3a00655
SHA1014d0e8df537a50771eece6a05206196f20a76c9
SHA2568afa1cd620d442b230810960e3b54c34d8c7e03708b01d33048144725d86537f
SHA512c88635e920c6337c7e2bf877f6ef240ecdf9c0964bd81ac19c482a0edeed63b86516645c1d7f6660d6788719fef3816aef1e45f29d94fd6c04838d7bf8c3bc6e
-
Filesize
9KB
MD5dee05de68f8ff6f964ce46db509ba466
SHA10c8b3ec1a535ee14984f66783a4394518474a500
SHA256cf088f973ee7a06e485f94bd71f9df2865b6bb345ac4a956c1583bfbb06f3ce2
SHA5120dc0f4a4be18d601ebc164f63103bd9b732d054262f4ed75e8e0ca04886b60f704f98b83efc32af0ba9bb22b47b7013ca85c87b7ec8c385d50bf10a855a74c60
-
Filesize
9KB
MD5f814f8c786564088539d96bfb34d1278
SHA18aa81ca3f819c6dff99c339b2d74e3535ab27679
SHA256326dfc957d5356be8d6bde6201de4c795ff765cf4d24fdfb32e12803e2353ff2
SHA512d007ecdd109f7cafc9552c41186e1a87757ef8c69cb82dff768dfb52486ee70251c4a6c80fa7fa00c16706c1e49b77503eed5b1eb42fdca5752ad7eb0292c3f6
-
Filesize
9KB
MD5ef3e7fc6cb101aa0637b16f7c21d62d6
SHA110c2e2572a869a7bed3f0c46bb567387d7849a8e
SHA2565ed6b594f427a175e8f5244bbbde5e0d167d1bfb25315a3e1a5d2211e1803c80
SHA5124c1570db3d4fd11a648f0a3ed0eaff308398a7edc5172aba8214e1860cd0f1b086db101af6b2e672338ec78a3d5040003ba8b845d807d9f0caded549b98d2896
-
Filesize
9KB
MD508b3669b89b6edc2a1cce162380c675a
SHA132aa0e23efa55b5099fa71e002bb04747eeedeee
SHA256fdcd6f699c282e96c8da72ec641e59bb3836d3f819d69de43de8ea658684d130
SHA5122eefa5150e0a64dfdc69d6827c2016fd142ec0b80a88285a719d0384b919d3ddc0dfaf614fd23d799b07f2ec3fb55d4a3cb158eedf5b3a0a6b90b4bd7b3af1be
-
Filesize
9KB
MD5af2b81c3cf6938df07b11079f2a6f9a5
SHA154234c1ebc5cdc62f99ca526982fbee86dd66760
SHA2568625a87620617e033b3c6bd22dddd32e4f974aaddc0dca9779d0338ae84c5396
SHA5124cc8f4af946966bb52f24edcb8cf6a22f1fb51a6b9896d718450ea3e198685e741b93b3fb0cd63e06022ec7f484992c3c81d0362c2f634dce06f5b1b20dfc439
-
Filesize
9KB
MD597a5d7ccfa76e6edc6b1c5971ead6984
SHA186d239c50149f201a15ff925d2e0a3a1fa447b15
SHA25653de5bd5f31b1d372b02c1d2ce8382e98ed79cb1a23f52c5a32eacac437a0ffb
SHA5120c2d8fdca033696ad4e530987882b6dc6cadf961c5c174a316673123b7f859a6f79c3ad804d98e6e8ba741ca6eed1e92f4f1c996ece6469787fc29dbace96a5f
-
Filesize
9KB
MD5362f3017dc8bd50b4f53117a6d0e1ecf
SHA1bfcedca932aa97dbb13967de50bc90c372caef8e
SHA256a362d2537d3f6b9587611b76a38c783762a995cc06975add64726a260af7c6b4
SHA5122c436a93ea87aa8ee603909cb11ba4a2868d6494c94f6ed499b5bc0bd211f759dc3562f50b0e682d81195c2adfd4196a021b014f6aad3fd8e7d5ba5b25d6a762
-
Filesize
9KB
MD5336a788e72be60d010cacd44a2ab95a2
SHA1ba974e472556f99fc60a6235aacd17ebf86f31cc
SHA2560d37fd6c8ab5f245613cd0a58ae42b1a9f20e13b1fb82706189c4dcf5b259b7c
SHA5121c79582b566c6d43dfffff913565986f99a2199ae9a648ce7a9eded665bdc21e4a2bb52164fa276dfd7e5ee10009d26816cfa6f30c834c09b984b72a7387db02
-
Filesize
15KB
MD57a4b212191ca5d25211d572109376769
SHA13ad8b1a0cc870229f5ae607e5dda9826df17abdc
SHA256ef6739618a5360fa70a8c97438795149bbb3b1818b4ba9f31387cb9937474abf
SHA512cd845a718be0975b865786c788c2ca2f65b453313375fc66c940c4df624d6afed76bd592fae016e26c3ad5e08847a6b9d442a14a278497e156a8e5cac43fce17
-
Filesize
207KB
MD51316b887d000c9b3f61e9ea9744a9023
SHA1a917c1892ce06f28a0f6c2ce4832912154f25c2e
SHA2565c1e7df1cb746f8885782b60b2422887d0568c1725d7d37ccee1bd007c3cbbc2
SHA5122f78598182d0e4e56faa617ff864394d11fe3571d6e32221f49e7a77c1633510082f4722094cc6ae73ceadee7687d7a0807d2b34a764fb686ecbeda5e058ccc7
-
Filesize
208KB
MD5edd6323ea588ca0a1a92fd90ab7a0410
SHA1fa9e4fd8a882bee61e7a01e339781d14b89c372f
SHA2569b065209d362052fc57c4f2b406f74bebbb65e0e1ac0df198d4eb79b3914d14a
SHA512913bdd6a91766dc6d91720c558915c81334ab6ffae5bcaea4681824df9483d10785a370daf8ebeaad136e2a55cc71512e758cf43b62643baf4866cabde18a8b4
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
6KB
MD5bd2b221b44e933dff3bd6f87051d5d7a
SHA1fd282edaf24b0b5c1e8e8a330d8bc19b7e2d96b7
SHA25647e529fed2103aed79a0ebac8c2a2e0da7c126c8d862c2a02ebea188cde72b92
SHA512c01446ef5732ba654d17f2c9c9c5a7d8d45847aba843c889a0af34f06da0a036570e271122e2ceedf3c1d62efacab78ac0dff3691577a5e6c26fee5011004fb3
-
Filesize
5KB
MD59fca4648f2f5239ee7e6fa107913e567
SHA1a34b998e7093d92c12eb440aaad513dc8eb137c6
SHA2567e414bd06860522caafb57a7e3137b3027e881e8b0a307ddc9c5b70a5cd3dcb0
SHA512ada43068dbaa75a5e532d080db71e462f9632079a75480956301e508cd81ca9a39ac1c1767dcde7f4a6e75de0dc2928feb4825bbf359d22858451328dbb7a8f7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c569fb2209c86853cf239ea3a6e8f4f6
SHA10dbb3eeb0aea9888d73baec65e8580ffa7d76c94
SHA256d4547aab957d0f938832ab2d178f5eefc2ee1e829a14967b95148e09fd8a7c57
SHA5124e4b2659b7c5c5d1a91ece955a289d9668c9628a62e299f6009ea611f280233597c027334b6731cf6b9638afeeeb2a516264ba370f4a2af9cf4a772323995e58
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\AlternateServices.bin
Filesize8KB
MD57f4e05939d11d49a616d155241a2ed05
SHA16a0627c7f8ec4e8091e15c431144e82e3dd5929e
SHA256fc1f60091054714b7c88d29db024bb2827a321f344cc6e16781370d15083fa32
SHA512b6eeac66bf7037d6c4e092e4577b77d402edf00d1a6cbe902e06f0a04b2371dff97280a943b8450fb6f33f0a3ceb46a98050971b4d2e983b81616b6364867534
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\bookmarkbackups\bookmarks-2024-09-15_11_UT4wYQLgjY-3vFiWOpYIog==.jsonlz4
Filesize1012B
MD507776d530444df861ad61e28b81ce943
SHA1e5b401ac606af8d3bec6e0a12e2e2e958b52d60d
SHA256f98d76826cdd3a0a6fdb4a0efbd6362092f5d53f4330dbd8f03e05d4b3adde42
SHA512c2feeca7e99e211b80902988c21e39dc95fd306da0160213b26e1bacb480548b44468ed3dc75e390ce670800248d97655a9939e7976becf1f1db3141d79d9f77
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD50cc13e4ecdc154f95246a7b3f59ddebd
SHA1f5f9b8dd4ffcf1864b4ff1422fd929df2aa65e6f
SHA256db0d4d09862dfbb91f2f6a7225a971da70922b979794c659128cf0444aa69832
SHA512645128ba2d943d51275ae82be6920aaf15fde2b9d5e331ca987dc3b09187017eec07013746cdf8debd57b27273301e806f2f211bc5b4eebdc5d5ccbb805aa165
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e