Resubmissions
22-11-2024 02:40
241122-c6dcxsynem 1022-11-2024 02:40
241122-c5xeeayndj 1022-11-2024 02:35
241122-c22vqaspc1 10Analysis
-
max time kernel
390s -
max time network
390s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe
Resource
win7-20240708-en
General
-
Target
68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe
-
Size
21KB
-
MD5
223b42adc2e6eeb342664ffa633c3a6a
-
SHA1
00612d9ce02cde93cd73eebcbee0deece4da3f8f
-
SHA256
68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361
-
SHA512
8c2e1ca20137aa4871509dbf17d27eeed4ae13433f95b63eda48570b2158317d3d72edda78f7b6c43bbc4f39c5bf84d83988c6afd6a5e6f1bdcda331f82c6847
-
SSDEEP
384:cs+2GqOOyQuluvnDS3d2dD03jVsV8ftnokwRwAoDNwAUPNtdI6+eQAozrBtHzkL:cs+2G8ZQ+SXjWooPjBBAtHzae6eX
Malware Config
Extracted
formbook
4.1
o62s
lectrobay.shop
enisehirarnavutkoy.xyz
itoolz.net
otorcycle-loans-40378.bond
opjobsinusa.today
uara228j.shop
ukulbagus10.click
enhealth07.shop
cpoker.pro
ome-remodeling-16949.bond
andu.shop
hubbychicocharmqs.shop
onghi292.top
ussines-web-creators.net
alenspencer.online
ryptogigt.top
epiyiisigorta.online
ental-implants-77717.bond
juta.click
enisehirevleriarnavutkoy.xyz
pertforces.store
kdse.boutique
uccessfulproduct.shop
newrist.online
2045.pictures
epid.dev
oxo.net
utivme.info
arehouse-inventory-65114.bond
axiquynhongiare.asia
etooclaim.store
heterraceongregory.store
orldwise-admission.online
outenbox.shop
kipoxz.xyz
iperliteratura.online
hoccyboxy.dev
iicf72105.vip
regnancy-10606.bond
dambelardino.net
oans-credits-55622.bond
zprintbox.store
3sejzs3.sbs
fi-group.world
iveworks.xyz
gtg.store
4mn.info
aliente.kaufen
ottostar.motorcycles
oker99-ms.christmas
p595.top
artmartuqsa.shop
infundcadastro.site
merp.link
irclemedia.shop
ind.expert
mitrywedkam.online
opcharlottesydimby.shop
mmamartin.info
uikstudy.sbs
estpro.group
card.yachts
mazoui.fun
ooktonook.online
hronika.fun
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1364-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Executes dropped EXE 6 IoCs
Processes:
Neoblox.exeNeoblox.exeNeoblox.exeNeoblox.exeNeoblox.exelightweightNeoblox.exepid Process 452 Neoblox.exe 344 Neoblox.exe 4704 Neoblox.exe 4496 Neoblox.exe 4948 Neoblox.exe 2816 lightweightNeoblox.exe -
Loads dropped DLL 51 IoCs
Processes:
Neoblox.exeNeoblox.exeNeoblox.exeNeoblox.exeNeoblox.exelightweightNeoblox.exepid Process 452 Neoblox.exe 452 Neoblox.exe 452 Neoblox.exe 452 Neoblox.exe 452 Neoblox.exe 452 Neoblox.exe 452 Neoblox.exe 452 Neoblox.exe 344 Neoblox.exe 344 Neoblox.exe 344 Neoblox.exe 344 Neoblox.exe 344 Neoblox.exe 344 Neoblox.exe 344 Neoblox.exe 344 Neoblox.exe 4704 Neoblox.exe 4704 Neoblox.exe 4704 Neoblox.exe 4704 Neoblox.exe 4704 Neoblox.exe 4704 Neoblox.exe 4704 Neoblox.exe 4704 Neoblox.exe 4496 Neoblox.exe 4496 Neoblox.exe 4496 Neoblox.exe 4496 Neoblox.exe 4496 Neoblox.exe 4496 Neoblox.exe 4496 Neoblox.exe 4496 Neoblox.exe 4948 Neoblox.exe 4948 Neoblox.exe 4948 Neoblox.exe 4948 Neoblox.exe 4948 Neoblox.exe 4948 Neoblox.exe 4948 Neoblox.exe 4948 Neoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361 = "C:\\Users\\Admin\\Documents\\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.pif" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exedescription pid Process procid_target PID 4264 set thread context of 1364 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 2920 452 WerFault.exe 142 1016 344 WerFault.exe 146 408 4704 WerFault.exe 150 1912 4496 WerFault.exe 161 1428 4948 WerFault.exe 164 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exeneobloxBootstrapper.exeRdrCEF.exeRdrCEF.exeRdrCEF.exeNeoblox.exeNeoblox.exeAcroRd32.exeRdrCEF.exeRdrCEF.exeNeoblox.execmd.exereg.exeNeoblox.execmd.exeNeoblox.exeRdrCEF.exeneobloxBootstrapper.exelightweightNeoblox.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neobloxBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neoblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neoblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neoblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neoblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neoblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neobloxBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lightweightNeoblox.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exeAcroRd32.exefirefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Processes:
Neoblox.exeNeoblox.exeNeoblox.exeNeoblox.exeNeoblox.exeAcroRd32.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Neoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Neoblox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Neoblox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Neoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\IESettingSync Neoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\IESettingSync Neoblox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Neoblox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Neoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Neoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\IESettingSync Neoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Neoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Neoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Neoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Neoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Neoblox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Neoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\IESettingSync Neoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\IESettingSync Neoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Neoblox.exe = "11001" Neoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Neoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Neoblox.exe -
Modifies registry class 36 IoCs
Processes:
lightweightNeoblox.exefirefox.exeneobloxBootstrapper.exemsedge.exeneobloxBootstrapper.exeOpenWith.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell lightweightNeoblox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff lightweightNeoblox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg lightweightNeoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" lightweightNeoblox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 lightweightNeoblox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" lightweightNeoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7 lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings neobloxBootstrapper.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 lightweightNeoblox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff lightweightNeoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" lightweightNeoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" lightweightNeoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" lightweightNeoblox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 14002e80922b16d365937a46956b92703aca08af0000 lightweightNeoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "7" lightweightNeoblox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\SniffedFolderType = "Documents" lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ lightweightNeoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings neobloxBootstrapper.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU lightweightNeoblox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 lightweightNeoblox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 lightweightNeoblox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" lightweightNeoblox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lightweightNeoblox.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exemsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exeAcroRd32.exemsedge.exelightweightNeoblox.exepid Process 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 1364 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 1364 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 2080 msedge.exe 2080 msedge.exe 4540 msedge.exe 4540 msedge.exe 32 identity_helper.exe 32 identity_helper.exe 3068 msedge.exe 3068 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 5568 msedge.exe 5568 msedge.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
OpenWith.exelightweightNeoblox.exepid Process 3112 OpenWith.exe 2816 lightweightNeoblox.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
Processes:
msedge.exepid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exefirefox.exeneobloxBootstrapper.exeneobloxBootstrapper.exelightweightNeoblox.exedescription pid Process Token: SeDebugPrivilege 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe Token: SeDebugPrivilege 4432 firefox.exe Token: SeDebugPrivilege 4432 firefox.exe Token: SeDebugPrivilege 468 neobloxBootstrapper.exe Token: SeDebugPrivilege 5576 neobloxBootstrapper.exe Token: SeDebugPrivilege 2816 lightweightNeoblox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
firefox.exemsedge.exepid Process 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of SendNotifyMessage 52 IoCs
Processes:
firefox.exemsedge.exepid Process 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4432 firefox.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of SetWindowsHookEx 43 IoCs
Processes:
firefox.exeNeoblox.exeNeoblox.exeNeoblox.exeOpenWith.exeAcroRd32.exeNeoblox.exeNeoblox.exelightweightNeoblox.exepid Process 4432 firefox.exe 452 Neoblox.exe 452 Neoblox.exe 344 Neoblox.exe 344 Neoblox.exe 4704 Neoblox.exe 4704 Neoblox.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 3112 OpenWith.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 1456 AcroRd32.exe 4496 Neoblox.exe 4496 Neoblox.exe 1456 AcroRd32.exe 4948 Neoblox.exe 4948 Neoblox.exe 2816 lightweightNeoblox.exe 2816 lightweightNeoblox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.execmd.exefirefox.exefirefox.exedescription pid Process procid_target PID 4264 wrote to memory of 4744 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 84 PID 4264 wrote to memory of 4744 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 84 PID 4264 wrote to memory of 4744 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 84 PID 4744 wrote to memory of 2056 4744 cmd.exe 86 PID 4744 wrote to memory of 2056 4744 cmd.exe 86 PID 4744 wrote to memory of 2056 4744 cmd.exe 86 PID 4264 wrote to memory of 3240 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 89 PID 4264 wrote to memory of 3240 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 89 PID 4264 wrote to memory of 3240 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 89 PID 4264 wrote to memory of 1364 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 91 PID 4264 wrote to memory of 1364 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 91 PID 4264 wrote to memory of 1364 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 91 PID 4264 wrote to memory of 1364 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 91 PID 4264 wrote to memory of 1364 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 91 PID 4264 wrote to memory of 1364 4264 68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe 91 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 2132 wrote to memory of 4432 2132 firefox.exe 97 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 PID 4432 wrote to memory of 4488 4432 firefox.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe"C:\Users\Admin\AppData\Local\Temp\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361" /t REG_SZ /F /D "C:\Users\Admin\Documents\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.pif"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361" /t REG_SZ /F /D "C:\Users\Admin\Documents\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.pif"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c Copy "C:\Users\Admin\AppData\Local\Temp\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe" "C:\Users\Admin\Documents\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.pif"2⤵
- System Location Discovery: System Language Discovery
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe"C:\Users\Admin\AppData\Local\Temp\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2212428f-4ecc-485a-b435-f637b6c82753} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" gpu3⤵PID:4488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be13fd02-3a14-493c-b8c0-fe318ee332f0} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" socket3⤵
- Checks processor information in registry
PID:3088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3044 -childID 1 -isForBrowser -prefsHandle 2992 -prefMapHandle 2988 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {acb1f8be-735f-4736-8ff7-16500ffcd9d1} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab3⤵PID:4728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2964 -childID 2 -isForBrowser -prefsHandle 3756 -prefMapHandle 3752 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {afcf3c7a-ad57-4377-b400-14f5ac054ae5} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab3⤵PID:4348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4624 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4424 -prefMapHandle 4432 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1793ec9-fa77-4470-a06f-d20f60157712} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" utility3⤵
- Checks processor information in registry
PID:1140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 3 -isForBrowser -prefsHandle 5476 -prefMapHandle 5416 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4841f2a1-098e-4286-a7f8-32e2f2d43691} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab3⤵PID:3028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5708 -childID 4 -isForBrowser -prefsHandle 5664 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {222aee39-5d79-4f00-82af-52b833651b9d} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab3⤵PID:704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5876 -childID 5 -isForBrowser -prefsHandle 5880 -prefMapHandle 5884 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b92d1885-125e-40f0-9828-c33e4eaa99e9} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab3⤵PID:4356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6236 -childID 6 -isForBrowser -prefsHandle 6348 -prefMapHandle 6340 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {345138f5-d07d-42c5-98f5-5a503808d866} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab3⤵PID:3612
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff856c246f8,0x7ff856c24708,0x7ff856c247182⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5668 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1756 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1308 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:3168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3452
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2816
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\neobloxBootstrapper.exe"C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\neobloxBootstrapper.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:468
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 22042⤵
- Program crash
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 452 -ip 4521⤵PID:2816
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 344 -s 22122⤵
- Program crash
PID:1016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 344 -ip 3441⤵PID:4760
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 22202⤵
- Program crash
PID:408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4704 -ip 47041⤵PID:2100
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3112 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\WeAreDevs_API.dll"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1456 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:1268 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=61280AA94B38A1DAB3CFD5DA10108DD1 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1348
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=81D3F29287E17D3DDBA341BC3FF06C9B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=81D3F29287E17D3DDBA341BC3FF06C9B --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2ED596C913CF0EE3AB4A4A8E75EE448E --mojo-platform-channel-handle=1816 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6DCD6627219E714A60C47C4E3F4FA7FD --mojo-platform-channel-handle=1832 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1136
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A561F3D269B45B5230F26E91733074E4 --mojo-platform-channel-handle=1780 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-
-
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 22082⤵
- Program crash
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4496 -ip 44961⤵PID:4424
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 22082⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4948 -ip 49481⤵PID:4124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault3f70fb5dhff11h4cb6hbd40hb2e2ebc7dea71⤵PID:5288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xf8,0x12c,0x7ff856c246f8,0x7ff856c24708,0x7ff856c247182⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4498769390643219446,9961997065885026037,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,4498769390643219446,9961997065885026037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5568
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:5732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaulteebba9a8ha797h4b84hbdd0hd8c0ea75de1b1⤵PID:5908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff856c246f8,0x7ff856c24708,0x7ff856c247182⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5895702705819063500,13154433543250784163,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5895702705819063500,13154433543250784163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵PID:5020
-
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\neobloxBootstrapper.exe"C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\neobloxBootstrapper.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5576
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\lightweightNeoblox\lightweightNeoblox.exe"C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\lightweightNeoblox\lightweightNeoblox.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2816
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x490 0x44c1⤵PID:5956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5b21a160856e8baaa825094ced111631c
SHA1a162e14683baaf1165de21b18864a8dd7a935923
SHA256e77600ac63e9c6c0b1e472a9255e4c79fbba769659ae5dd7cf44faba6cbb431c
SHA512d9405e905c733d2c56bf13177b231a567b79e9f765279bfedc63c5cce0ffa9b5d50ef1a200b61db8558a1b91820a2ab111e7fed92c7cf42bd3f1a08ab0cf0878
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD5bac895ef8f739f9bdc7086ca3436069a
SHA11d98efb51f620797ed51867a5d24689f16786f8c
SHA256df7a25f79d99fdd9058741acd3a1c1f520e9cde9e5bb0a26aaa5f845e4f9a710
SHA51222ee86acb8fd212e59c66ed5ece63245feddfd696ecc1355581cb3594e33a2edee08649f209d888db17f94439c658da851904d49409fd90496aa7e901135902d
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
67KB
MD5b275fa8d2d2d768231289d114f48e35f
SHA1bb96003ff86bd9dedbd2976b1916d87ac6402073
SHA2561b36ed5c122ad5b79b8cc8455e434ce481e2c0faab6a82726910e60807f178a1
SHA512d28918346e3fda06cd1e1c5c43d81805b66188a83e8ffcab7c8b19fe695c9ca5e05c7b9808599966df3c4cd81e73728189a131789c94df93c5b2500ce8ec8811
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
63KB
MD5226541550a51911c375216f718493f65
SHA1f6e608468401f9384cabdef45ca19e2afacc84bd
SHA256caecff4179910ce0ff470f9fa9eb4349e8fb717fa1432cf19987450a4e1ef4a5
SHA5122947b309f15e0e321beb9506861883fde8391c6f6140178c7e6ee7750d6418266360c335477cae0b067a6a6d86935ec5f7acdfdacc9edffa8b04ec71be210516
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD54f21141d1296b9358fb856eed2221972
SHA1122a297665e8ddbfb530d5dc3f0e086867494ae2
SHA2564bed0475f066e17f9e0694b6f07d546a1ffe12ef310ffb63da44e3a5d27b03a1
SHA5125b8f119612f83c5f38483c62ec85d7c9fe663d6f0e7adcf126a96f1422858c2af0e80d7b826bdc82fb2052ef29a95309ca21734147234f33dbd902151ca450e4
-
Filesize
1KB
MD59377b0cbb1fd356dfca27e8bd655bdb5
SHA1d58165d8ae4ea45ceeef72794287ce37bd9d84f7
SHA256f5244e37985e855e50dad500005447e5563e44df3140ae139a791a39a29a14ca
SHA512fa405edd2b3743aff9880d039432fadfd5a84aec5f6a9f4f4862ec429633808f26913226dbb516368e12d8318979519e614d550bb98e22f663a624f622b74335
-
Filesize
1KB
MD51204f75b573e61e51c127d77b7f14472
SHA14dc1c8284b2067efacad5b1f0f51a9042c8db102
SHA256d86ce5e9c204e511e7624ca7540f968c57aace32bdddba1fa2dfc8495d6431b0
SHA5121ae45c930aef6c5bc42a4024e1fd10e5da65d465bfcda8ed7c96ee32f77bc158008bbf940a9a639cbe54daf0f1e42061c3fe68bd1c916c6288a33848d28b6b20
-
Filesize
1KB
MD50942d46f5e173fd709aa1053eed02558
SHA1b3a3402c76ebb58dafb2015f92204d2382ae6501
SHA256c042ea836262fe9eb03aa27c7293d0df46d2919648f0dfe93971a104600930d3
SHA51255415194bc1be22923900388eac61d78b1d50be7da1733f7bb1892df72c79b004c5cb0f6eaae45b095fcad9672090c44eaa98c87be3a7c8cc1163d257faf7a19
-
Filesize
1KB
MD542ac0cc417454a268538522214caccb6
SHA153e30331999d8ab6a818289b2d1951aea9d9c335
SHA25693b3cee6a3ae42b673d1a4a6c14733506f51ae2e1e24a14350da3f0a8d4f2efc
SHA512d8735045156d0d39cf0aedc1e5bc733e1eda538c4301b1523497d4b32085f26c864435f8540dc10656c5bd50c108f308861cd85a9011b3eeac7cf84a428e4540
-
Filesize
6KB
MD5902e51b656d81a831d3e4ffc83deca9a
SHA18fa774f2feed89f87946300d4c568160254f249a
SHA2564b8e1a6eec97c378f774a8981f84ee46aa7e62c1548fe9f858f5269a594c2eed
SHA512df68fd14725a319f9ed4efb70ffec00beb7be5a169e62ad09877466f8f6bc81f1e3518f786939c413532ee242171c2d4b2c0cc77ac308161d1b1a31b1569de1b
-
Filesize
5KB
MD52ecc783473a0de25e01a046742992f1e
SHA1fedc4e6ec45865c863df1118bda30de6ed183489
SHA25673a2dc05b761173d4174d7f6c16c691d20c8ee747809c3f653b03fcb87897d0d
SHA512f99a66c249f58c4093e6259c46b940bd30a979ad687e011e5eb94c5f683068941ceff43dbb3f684fe0b802f56541d7f7d90fff2c0eafb5a96084a8c5a6577678
-
Filesize
7KB
MD555498c10643d05f487faa425bba032cb
SHA1370fdcdcdc36264978d52bdf7011d09beedf66a0
SHA256989352f62ff7fb6bc16755e0dfd5bb32df27afcb3fd975e82667de65733e6fe5
SHA5122ae2285e3e85afcaddfa442d7c9ddf9980562dc4bb5beeed9338a787f1441455104a7f69a3587fba268b39e0599fe3bd6e035b436ff78fbf64235c83e8cf5ac8
-
Filesize
6KB
MD57a5a54c654dae75b7259adc8bd0d983b
SHA1f6828047b1c3f6ef065a045d255c183b8e5e5195
SHA2565348169d6ae5304e46b61c65e79b503ec13e8c8738da3c24d3c1eb8b914160b4
SHA5124a7ad90b3e68a38c86f4d113a85490be1be8e02ab2f0bcf6aaa36cf013eefdd0a071b9e41cd885cd2a86511e3adb24bed7842cccf66cb110a91f72cae7b3ef2b
-
Filesize
7KB
MD546491f9fad2b1e0cb320591ab6fc59c9
SHA15449e3c61d5881cb81ea6b08fe563dd6bab40768
SHA2569488b319f9ad392216377346f36f6c084f5d65db6468e855f23b20e4615b0414
SHA512562af5279a1835d2028cf1facf660f17da9bad2c401e738c808bdd9ba9df76eb8f520cdd509665b61f17f2c0058a4714256b735d60efd27cf1250221b545af0c
-
Filesize
6KB
MD5bad14326c785fac5007490578848ff33
SHA1d27735c5b124b6739d522020bdb2a647afb01154
SHA2564431292b7b7b14ff9eba5c094908447151eebba7180124210e51a09e35acce64
SHA512d48c4af71e4266262b3f6abfc6ddb1a53d18acdd5d541d126e6da244fa6b83aa926aedc8210a206938e8a466546376cd0ac070ce63df9279a387048cbdfa86b6
-
Filesize
6KB
MD58b82b498c177420f4ff4ac4fca73d584
SHA11617cb73f9dae5470029334c1e4e2f73ad643f95
SHA256e280780096370b9036fe3897dfeacd1f7123f7e1f5d08aa72c0db75e314a6edb
SHA512c867e78e15708797b09c79df68dc005342b8fbe40e3d385ca107ee50024f89127dc7dc74ea7bb05fab94c12fe33ea323537845dfc15cfd7ff46e02dadb5fc5a9
-
Filesize
1KB
MD5a93ac793eefc37b7c6b01f3857e14bae
SHA1c2e4f33334ece78a9df7b533ccf21ced39685788
SHA2569a153bbd554288b3018725fb413516581be36d69c662e7f11dfe959973adfb2c
SHA512571f0683f813dd14157155d9c064dabb96eb4486a3edc9f3c574f41fb898b8713792df5cf877e2bee7467cda6a98e4fa4415392043f94e91f9e2e922c4fd4beb
-
Filesize
1KB
MD529725b230a9487997939b90a75915545
SHA1c12acbf49bd8712c1658cdca9d34ee73f25339c9
SHA256f55d9a1ea7bd410f9f0eb1ad03affec98e739f7bb196e18f4acd91a1f2b4af04
SHA5127a23c5100c4933302300a1833984b84d52f490826f3bc68ea39f13b7b465e95b7653a319e29bf41c94edded1860f3c6ac67527d60cafc3d575204cea6a851342
-
Filesize
1KB
MD5d2dd1e3faa32a4e8f391ce439ff9cef8
SHA199b74d06e6fc3b51f26a8bd1d3eab2393f391c5b
SHA256de1f6d0fda4434baec23f1220455069a352e89f02ca9ab55e13dcb0765e400cc
SHA5126348e6b895a2318c6b103cf75e4b959233f7c1d175809bcbfd52055103175776c9c51b5a491e8efe0b94fce8035964afb701ae5dc61b9d30812d8c31caa5a5be
-
Filesize
1KB
MD58e7b4a828fbdfb7ac7fc9bb32a5d41d5
SHA1814b8af5f64d791f439e1dccc92f4faec3ae7f2c
SHA2561716e56b5f92f66f98c23a4546655137032a12350a52b3156dc5ffcb94628d00
SHA512ccddd34c870cc27379a5cd7348fcc1abef859b41a26b3994afd6e1a0621e749f955ac30b866ddfa957a8b9a43f9bb8f86326a89f5d34c276ee6d7ea09f44c177
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD500fdf56fb2aabd5ff957ae35d5ef5f7b
SHA184f0e90cab9f6cd115ca99b2c94f400eea9054f6
SHA256077446dd1877b22f6c8b5f3f8a2ed0f3936881a77183ce2480550abc83c59172
SHA51293046d49e80fb8d7b24f2306929e9c69fd56831ca27c03ecf8bfa4cf7c37f18702791325b5c1f393b8ae37817a6fb6d8a6710971083fe2129abb4d2b787cc5b4
-
Filesize
10KB
MD5ca5632147df1a0cc0a82489fe3eeb824
SHA1622393553cb929f31008e422656ae8307d2bb1d5
SHA2561b87876dcef144ae945d4ebc5097a9037878165d433d66f9f92bf3323b9d0537
SHA512bfd19fd6b442a3fd0548fe249e69c7c600971fab16df730e309482c300bdfc7ac883c62d5c28ed869426718db8a0646f2a43bbbe6a03011a429a56dfc10c0921
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5532bbe90af0ab446c5fee688dc9ec3f2
SHA1728ac4c9ae2426d93850a08646ab0fa35fd04a2a
SHA256585b0baf4896d526b21776c3a315571c7092526ecb62cfa84f203c3506630cb5
SHA51255464374b3eaee93905a44f1921976b50c4b147056b53e4dacbbf9b6f7edcab4b75b20cfc56e6e584a2ffc81496c691b5b3fbecc52e2acb21b98e4142804fb55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD5acc126cd4d1b34fb248611d39bc815be
SHA1904ade0996cd02988b0c52afc1c1dbd89051cc25
SHA2565a292dcfcbe466a903dabbc38982a1ca82f6102525f4fe3e1b8d6dcbed9c2729
SHA5120b73c1003dd84b85387b8bd0b6ffc3295d3308fc441baedfd5901ce87b25bfcc41d5edc9c486660c42f6655eae7b0c6cd1222ea683f2767338127f7760c686d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD53882da304885ac8b57e3d90dc3e3d067
SHA14583991da4c6602ec3f1e077722325449dbe8a8d
SHA256a5fec54b44f0c74129e5f66d54fce4a2d57432e99363fb96069bbff63493efbc
SHA5128e962fe7d5a59f2bad8e7f8a0a1c61f7e3ca2ead47e3d069866cb1772af9fe60176bc51760c3a57a3cbce0f04ede78905314fdcf17b18a7c1b3d92a6ce83d7d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5c2925264e041a23fed76faa12ebf5957
SHA18d7221eb3d16c1fbe3eed5a5ef73926a392e259c
SHA256853594ec1d8fcd9a466ed0a4a2a2bbae72078a6daf4ce595aafe2cd26a56386c
SHA512ef68b28ec28b39ffcc715906b87378af8a2cc0fb850788190176ab8df369762eb70ef1370b33c533411e7d891b4652ac79707616a9b651ec28479f09c1d55ba0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5dea01a0e43a7f8cb0428a42d2b4ede4d
SHA18ed5c1d94e9624dea20a8faafea8d25fd45de5b7
SHA256f52e3a0b561994624d50031a6030777952735b304d04be3c65ec07b44324e7fb
SHA512638e16cbbe43f93f973b2e678c7a9970e2d021cab5ce7da8c2d27ca03aab651942da6809ff75768aec97a7a0063480d1f7a3a7356792474eb5d292a19c5fa3dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5c3d625cb00a9987c65ac9500c523d96e
SHA1236a6c6f8071e74e8ec7880bb26a9600aa724bce
SHA25609837f0e2303b965571d12e2f9c40182c516e46af084748e3dc5678e787614b4
SHA512fd651160d63546cb19e72563f81253aa00c27f65d791c4c222aa887ff2c294df47eb89d37f5fdfcee27eb6bf40b0b68df7f2dbe64f6b715832a5f74d453897e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\55d68b40-2840-41e9-b6a2-b38db238b75a
Filesize659B
MD52a79a39c7fdb843e2e57c4f601918e95
SHA195c43ac3928367d5b5dfbc26abd462968d199ad9
SHA256ffab320a938265dd829b7b544bd9e32fe8192f4de1c431fb591ad254eea6b36a
SHA51296530bcecde656000fdc184bfff0d4d824c32532ade254fb4611c610f805bb252002be41643fd0b3465a4b94a3445fa548706ef0c1314d4eb2a12f572fdc50bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\be6480d1-9b4d-4544-8d43-168bf92f1813
Filesize982B
MD569ef4a10a5fdf4ef367c43e25508cb1e
SHA1ea620776e1f2aaaeaf51cd7afd5eff01d8440a73
SHA256183cb8c09970ec6179d2a1bf89ffcabd942180e8f35afc90d07f11906beb84d7
SHA5121f3d70731bdc142061e89bf3ea250ccc34313f3190de0fc777d035e2b6c6f6ca4f0a0d3b613f4679a1feb6d5729f249382ed97270ff27611a44e8c4b6b50bfac
-
Filesize
10KB
MD5103e181fe257264c73fe229eec636971
SHA16ac2c1136f824dae177663c187b19591efdc09bc
SHA2561834f2fecb364318d776ab32c9679ae444798f002e79a4a703bca10b7b866aed
SHA5127e2d97c7869466c2e5e79d3e2225b5923b26941beecc56ba77fe533f78e391c51b63a9f38a4dfbc87150844442fbbda09151302f72ecfe77386f208ef25ac3dc
-
Filesize
10KB
MD51d51deebf6935dd0127b8ed0a11bc1be
SHA159709b2367a93075e01fb709a3d9a23f6447c7d2
SHA2565a986e620bb60cf037f044e2a522ae9752333dff74fddfa825cfd7444f2515cb
SHA5127fe0e0da8ce0771f2c818dc145b49c89cbbc1ba985965e357c9c4e7c6b631b2cf84d622f38d5ae9f7226ba3fd6377cad0c91637528dcb2ac19a8feaadb27d80c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize368KB
MD57aa16d4ca07a987b9d3d7643f699f31f
SHA1cb27eb1c90e94565d835ead380476cdb9631bde4
SHA256f960390742d2f35627722ed7c03ee308de9bcc74f19e05a1520230e5798a398b
SHA51254685a5282fa8fec9ba08bfac71e445d9c66dcf1688ce09d6344905d66ee840f0d4ef94fc4991f4d45cbc249fb543432bf5fc6f8f7dbec6c2a9726c10b12d4e6
-
Filesize
10KB
MD51c5ffe214040f00ec898bd3c5110e8b2
SHA14abfbf2bcbcb742b4c4bbb11d21cafeeb93cf8bb
SHA25623312041ffa8628a7f89a21ba72af853cb90f26cf134d456656276930b26c1ec
SHA512682e5c06b1d26bee3f8d5cab9ff9c70908906c20b28ad7e022c37ce3b62b9af5cb1bf39734f387353566b45f5cf9f7c879c3d0a32c894168e6fe64ce7b80bd36
-
Filesize
1.2MB
MD5457242aba102f82daedb7ec907b1ac5c
SHA1bb20ca697349a16fc80c928aea8d155c1cb4fa40
SHA2563667300295731be993d6a2d6a21e23e8be9fb177a8b3325f55db28fd265fc19a
SHA51223f8bd7cad2e8530dae8f14e620343658cf07ecfae71d223666166228e2d223abc5e981c26eb78ed4c4737c74284737a854c8e7e7cf06441244cbcfc9c6acd1b
-
Filesize
6KB
MD508b6930cde9eb303d1dd59b311587072
SHA19f8b237181c918f7c3b660b0b57d915253243307
SHA256eaab49b697c5993346036e9a2ff404587d76d7bc548e6cee65fc7b23688e9672
SHA512178ceeb9c0babf5208d86c339ffa6da7521afa28244505b0fada8a649672c0bba256fb1833ef353f187fa5bc0b8ff2c389bc4a8811eac16330c98d583f375337
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Monaco\vs\editor\editor.main.css
Filesize171KB
MD5233217455a3ef3604bf4942024b94f98
SHA195cd3ce46f4ca65708ec25d59dddbfa3fc44e143
SHA2562ec118616a1370e7c37342da85834ca1819400c28f83abfcbbb1ef50b51f7701
SHA5126f4cb7b88673666b7dc1beab3ec2aec4d7d353e6da9f6f14ed2fee8848c7da34ee5060d9eb34ecbb5db71b5b98e3f8582c09ef3efe4f2d9d3135dea87d497455
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Monaco\vs\editor\editor.main.js
Filesize2.0MB
MD59399a8eaa741d04b0ae6566a5ebb8106
SHA15646a9d35b773d784ad914417ed861c5cba45e31
SHA25693d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18
SHA512d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8
-
C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Monaco\vs\editor\editor.main.nls.js
Filesize31KB
MD574dd2381ddbb5af80ce28aefed3068fc
SHA10996dc91842ab20387e08a46f3807a3f77958902
SHA256fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48
SHA5128841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e
-
Filesize
27KB
MD58a3086f6c6298f986bda09080dd003b1
SHA18c7d41c586bfa015fb5cc50a2fdc547711b57c3c
SHA2560512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9
SHA5129e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017
-
Filesize
976KB
MD560bdad498581b4998ad0397465d30891
SHA1a57494c1f958dce86707187d8dfe17ae5c6028b7
SHA25627ea6419a7bedd7b748b67f7b436d7beff65dcc149ac942b9d840f096fae7355
SHA512c48bdb6b0cd6c66512f7204ef44b54f6a2a3d57b2586f95cab88288a6da620b060bff8ede38dd9352422ad6b926a2f0ceca76da1bc3df2de3c0867797e665396
-
Filesize
530B
MD5c7a4606f8f222fc96e1e6b08c093794b
SHA12700b3727ab01d93e75e1e12f308dcaeb1d37dba
SHA25632d656a69b19be98ae050512a4d0f49ebe21b6f7bb9c50130b7e952ea4f5239b
SHA5127516375b47536a51ede8079d25760e0142ac93077326b6cc033fd6cb1676b65aec7edb3f702922506f2b6b18992cd219be01e7adbf70c6d13404adceb410472b
-
Filesize
771KB
MD5fa842ffa299c794e57597aae857d9cb3
SHA1154afdfd9bd80c1b512f516a8c187c6dd849161e
SHA256b1d4cdc7891d51636c5e82a91b9bf20e6bb6e68ddf515ac6f51fbda7b199d07d
SHA51204ee2bff2a9ff0cf89150bb73f0f6a0bda372a245f12c5772b7167821f54f3d1d43292e3ce3c9f2eca2202688c179d5f09248c0fe522bf028c221e07b2d34e4a
-
Filesize
605KB
MD5f263efb1b579cc33a0f1024c2a18d03b
SHA1e9dc916b6d4606ba47e30787387dcfd490bafc56
SHA256f2732f9e3a87d874a3108f8ff0be200bcab9d07fe77b02aaacd94da1efcb3963
SHA51209a3d948b52b16136f2ce9ecdb094a99092a4a9cf6f324e67a0a5d04d244cf4c3fd2696010f1884272240c3bc24fdaf1edc9ac102bc438564e7fc0be7b2fca34