Resubmissions
27-11-2024 09:18
241127-k9zz4atpgm 1027-11-2024 07:19
241127-h5x9laznhp 1026-11-2024 11:44
241126-nwbl5awlcj 1026-11-2024 11:26
241126-nj43xavqgk 1026-11-2024 11:06
241126-m7p38aykas 1026-11-2024 11:05
241126-m64j8avlem 1026-11-2024 10:59
241126-m3e3fsvkcm 1026-11-2024 06:07
241126-gvaj4svlhl 1026-11-2024 06:03
241126-gsj1rsvlbr 10Analysis
-
max time kernel
248s -
max time network
257s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-11-2024 11:26
Static task
static1
Behavioral task
behavioral1
Sample
a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe
Resource
win11-20241007-en
Errors
General
-
Target
a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe
-
Size
388KB
-
MD5
a0340430d4b1c1f6dd4048ab98f2e4b2
-
SHA1
a43ff275972b4ed9b7f3ece61d7d49375db635e9
-
SHA256
9b1622602d4ae8196316deeb91fbdd1346a4b31453f3762be119e24c84827217
-
SHA512
54ca85bee0ded2a742c767565159c0e3121d8cd1d97cebc751d067b1ea45d9fca86b6d5acad5b472eddef23d20afcc8ae3497cdd411fd9f393d80e0c90f2cd8d
-
SSDEEP
12288:XhTjRwlkwFrnAEryLFcG3yBrZTRDgZ8zOhG6:p4DRw7325gPh
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\Recovery+dfiji.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/B1C2A39D546D4A9
http://kkd47eh4hdjshb5t.angortra.at/B1C2A39D546D4A9
http://ytrest84y5i456hghadefdsd.pontogrot.com/B1C2A39D546D4A9
http://xlowfznrg4wf7dli.ONION/B1C2A39D546D4A9
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (807) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+dfiji.png fnvvakgflykx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+dfiji.txt fnvvakgflykx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+dfiji.html fnvvakgflykx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+dfiji.png fnvvakgflykx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+dfiji.txt fnvvakgflykx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+dfiji.html fnvvakgflykx.exe -
Executes dropped EXE 2 IoCs
pid Process 1960 fnvvakgflykx.exe 4120 fnvvakgflykx.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Windows\CurrentVersion\Run\ngkceqrvdehs = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\fnvvakgflykx.exe\"" fnvvakgflykx.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 000.exe File opened (read-only) \??\J: 000.exe File opened (read-only) \??\P: 000.exe File opened (read-only) \??\S: 000.exe File opened (read-only) \??\W: 000.exe File opened (read-only) \??\X: 000.exe File opened (read-only) \??\L: 000.exe File opened (read-only) \??\M: 000.exe File opened (read-only) \??\T: 000.exe File opened (read-only) \??\E: 000.exe File opened (read-only) \??\G: 000.exe File opened (read-only) \??\K: 000.exe File opened (read-only) \??\U: 000.exe File opened (read-only) \??\Z: 000.exe File opened (read-only) \??\V: 000.exe File opened (read-only) \??\B: 000.exe File opened (read-only) \??\H: 000.exe File opened (read-only) \??\I: 000.exe File opened (read-only) \??\N: 000.exe File opened (read-only) \??\O: 000.exe File opened (read-only) \??\Q: 000.exe File opened (read-only) \??\R: 000.exe File opened (read-only) \??\Y: 000.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Control Panel\Desktop\Wallpaper 000.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 416 set thread context of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 1960 set thread context of 4120 1960 fnvvakgflykx.exe 94 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.21012.10511.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-64_altform-unplated_contrast-white.png fnvvakgflykx.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\vi-VN\Recovery+dfiji.html fnvvakgflykx.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\Recovery+dfiji.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.40831.0_x64__8wekyb3d8bbwe\Assets\contrast-black\StoreLogo.scale-200_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.40831.0_x64__8wekyb3d8bbwe\Assets\StoreLogo.scale-200.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_1.0.38.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-36_altform-unplated_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\Images\Square44x44Logo.targetsize-32_altform-unplated_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_10.2.41172.0_x64__8wekyb3d8bbwe\Assets\TipsAppList.targetsize-16_altform-unplated.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.6.3102.0_neutral_split.scale-125_8wekyb3d8bbwe\Win10\MicrosoftSolitaireBadgeLogo.scale-125.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_x64__8wekyb3d8bbwe\Images\contrast-black\PowerAutomateSquare50x50Logo.scale-150.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-40_altform-unplated_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.32731.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.scale-400_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_21.21030.25003.0_x64__8wekyb3d8bbwe\Assets\Icon_Xbox_PhotosSplashWideTile.scale-200.png fnvvakgflykx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\Recovery+dfiji.png fnvvakgflykx.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\Recovery+dfiji.png fnvvakgflykx.exe File opened for modification C:\Program Files\Windows Media Player\es-ES\Recovery+dfiji.txt fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.6.3102.0_neutral_split.scale-125_8wekyb3d8bbwe\Win10\MicrosoftSolitaireSplashScreen.scale-125.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SnipSketchAppList.targetsize-48_altform-unplated.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.40831.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\WideTile.scale-125_contrast-white.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Images\Square44x44Logo.scale-200.png fnvvakgflykx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ja\Recovery+dfiji.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.scale-100_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\Recovery+dfiji.html fnvvakgflykx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\Recovery+dfiji.txt fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.32731.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SmallTile.scale-125_contrast-white.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsNotepad_10.2102.13.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\NotepadAppList.scale-100.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\en-US\Recovery+dfiji.txt fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SnipSketchAppList.targetsize-256.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-30.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\Recovery+dfiji.txt fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\theme\node_modules\@fluentui\dom-utilities\lib-amd\getParent.js fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-80_altform-unplated_contrast-white.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_1.0.6.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherAppList.targetsize-48_altform-lightunplated.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\Images\Square44x44Logo.targetsize-16_altform-unplated_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\Images\Square44x44Logo.targetsize-60_contrast-white.png fnvvakgflykx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Send2.16.GrayF.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_10.2.41172.0_x64__8wekyb3d8bbwe\Assets\TipsAppList.targetsize-36_altform-unplated.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Todos_0.33.33351.0_x64__8wekyb3d8bbwe\Assets\Illustrations\Recovery+dfiji.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.41182.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-150_contrast-white.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.40831.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-256_contrast-white.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\EmptyCalendarSearch.scale-100.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_1.0.6.0_x64__8wekyb3d8bbwe\Recovery+dfiji.html fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.40831.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-60.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.21012.10511.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-80_altform-unplated.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\Keytips.js fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_2.2106.2807.0_x64__8wekyb3d8bbwe\Assets\Store\AppIcon.scale-150.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailSmallTile.scale-150.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-commonjs\components\DocumentCard\DocumentCardImage.base.js fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Generic-Light.scale-250.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.2008.32311.0_x64__8wekyb3d8bbwe\Assets\contrast-black\GetHelpAppList.targetsize-80_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.6.3102.0_neutral_split.scale-200_8wekyb3d8bbwe\Win10\contrast-black\Recovery+dfiji.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_4.0.2.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Icons\StickyNotesStoreLogo.scale-100_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SnipSketchAppList.targetsize-40.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_x64__8wekyb3d8bbwe\Assets\SnipSketchAppList.targetsize-48_altform-unplated.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_21.21030.25003.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-16_altform-lightunplated_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1909.12456.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\PeopleWideTile.scale-100.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-GoogleCloudCacheMini.scale-200.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_12104.1001.1.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\data\en-us\3.jpg fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.32731.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-40.png fnvvakgflykx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-140.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\PaintLargeTile.scale-100.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\Facepile.js fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-80_altform-unplated_contrast-black.png fnvvakgflykx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Recovery+dfiji.html fnvvakgflykx.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fnvvakgflykx.exe a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe File opened for modification C:\Windows\fnvvakgflykx.exe a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnvvakgflykx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnvvakgflykx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 5520 taskkill.exe 3180 taskkill.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\icon.ico" 000.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2499603254-3415597248-1508446358-1000\{FE5D7D78-3375-4A85-98B7-776B71198594} 000.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings fnvvakgflykx.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\DefaultIcon 000.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile 000.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\Downloads\000exe-master.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\000.zip:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4156 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2332 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe 4120 fnvvakgflykx.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3592 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe Token: SeDebugPrivilege 1128 firefox.exe Token: SeDebugPrivilege 1128 firefox.exe Token: SeDebugPrivilege 4120 fnvvakgflykx.exe Token: SeIncreaseQuotaPrivilege 4928 WMIC.exe Token: SeSecurityPrivilege 4928 WMIC.exe Token: SeTakeOwnershipPrivilege 4928 WMIC.exe Token: SeLoadDriverPrivilege 4928 WMIC.exe Token: SeSystemProfilePrivilege 4928 WMIC.exe Token: SeSystemtimePrivilege 4928 WMIC.exe Token: SeProfSingleProcessPrivilege 4928 WMIC.exe Token: SeIncBasePriorityPrivilege 4928 WMIC.exe Token: SeCreatePagefilePrivilege 4928 WMIC.exe Token: SeBackupPrivilege 4928 WMIC.exe Token: SeRestorePrivilege 4928 WMIC.exe Token: SeShutdownPrivilege 4928 WMIC.exe Token: SeDebugPrivilege 4928 WMIC.exe Token: SeSystemEnvironmentPrivilege 4928 WMIC.exe Token: SeRemoteShutdownPrivilege 4928 WMIC.exe Token: SeUndockPrivilege 4928 WMIC.exe Token: SeManageVolumePrivilege 4928 WMIC.exe Token: 33 4928 WMIC.exe Token: 34 4928 WMIC.exe Token: 35 4928 WMIC.exe Token: 36 4928 WMIC.exe Token: SeIncreaseQuotaPrivilege 2980 WMIC.exe Token: SeSecurityPrivilege 2980 WMIC.exe Token: SeTakeOwnershipPrivilege 2980 WMIC.exe Token: SeLoadDriverPrivilege 2980 WMIC.exe Token: SeSystemProfilePrivilege 2980 WMIC.exe Token: SeSystemtimePrivilege 2980 WMIC.exe Token: SeProfSingleProcessPrivilege 2980 WMIC.exe Token: SeIncBasePriorityPrivilege 2980 WMIC.exe Token: SeCreatePagefilePrivilege 2980 WMIC.exe Token: SeBackupPrivilege 2980 WMIC.exe Token: SeRestorePrivilege 2980 WMIC.exe Token: SeShutdownPrivilege 2980 WMIC.exe Token: SeDebugPrivilege 2980 WMIC.exe Token: SeSystemEnvironmentPrivilege 2980 WMIC.exe Token: SeRemoteShutdownPrivilege 2980 WMIC.exe Token: SeUndockPrivilege 2980 WMIC.exe Token: SeManageVolumePrivilege 2980 WMIC.exe Token: 33 2980 WMIC.exe Token: 34 2980 WMIC.exe Token: 35 2980 WMIC.exe Token: 36 2980 WMIC.exe Token: SeDebugPrivilege 1128 firefox.exe Token: SeDebugPrivilege 1128 firefox.exe Token: SeDebugPrivilege 1128 firefox.exe Token: SeDebugPrivilege 1128 firefox.exe Token: SeDebugPrivilege 1128 firefox.exe Token: SeDebugPrivilege 5520 taskkill.exe Token: SeShutdownPrivilege 4628 000.exe Token: SeCreatePagefilePrivilege 4628 000.exe Token: SeShutdownPrivilege 4628 000.exe Token: SeCreatePagefilePrivilege 4628 000.exe Token: SeDebugPrivilege 3180 taskkill.exe Token: SeShutdownPrivilege 4628 000.exe Token: SeCreatePagefilePrivilege 4628 000.exe Token: SeIncreaseQuotaPrivilege 5276 WMIC.exe Token: SeSecurityPrivilege 5276 WMIC.exe Token: SeTakeOwnershipPrivilege 5276 WMIC.exe Token: SeLoadDriverPrivilege 5276 WMIC.exe Token: SeSystemProfilePrivilege 5276 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of SendNotifyMessage 42 IoCs
pid Process 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 2332 vlc.exe 2332 vlc.exe 2332 vlc.exe 2332 vlc.exe 2332 vlc.exe 2332 vlc.exe 2332 vlc.exe 2332 vlc.exe 1128 firefox.exe 1128 firefox.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 4968 OpenWith.exe 4968 OpenWith.exe 4968 OpenWith.exe 4968 OpenWith.exe 4968 OpenWith.exe 4968 OpenWith.exe 4968 OpenWith.exe 4968 OpenWith.exe 4968 OpenWith.exe 4968 OpenWith.exe 4968 OpenWith.exe 2332 vlc.exe 2332 vlc.exe 2332 vlc.exe 2332 vlc.exe 1128 firefox.exe 1128 firefox.exe 1128 firefox.exe 4628 000.exe 4628 000.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 416 wrote to memory of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 416 wrote to memory of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 416 wrote to memory of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 416 wrote to memory of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 416 wrote to memory of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 416 wrote to memory of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 416 wrote to memory of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 416 wrote to memory of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 416 wrote to memory of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 416 wrote to memory of 3592 416 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 77 PID 3592 wrote to memory of 1960 3592 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 78 PID 3592 wrote to memory of 1960 3592 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 78 PID 3592 wrote to memory of 1960 3592 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 78 PID 3592 wrote to memory of 2936 3592 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 79 PID 3592 wrote to memory of 2936 3592 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 79 PID 3592 wrote to memory of 2936 3592 a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe 79 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 4848 wrote to memory of 1128 4848 firefox.exe 84 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 PID 1128 wrote to memory of 2132 1128 firefox.exe 85 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fnvvakgflykx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" fnvvakgflykx.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Users\Admin\AppData\Local\Temp\a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\fnvvakgflykx.exeC:\Windows\fnvvakgflykx.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\fnvvakgflykx.exeC:\Windows\fnvvakgflykx.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4120 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff921423cb8,0x7ff921423cc8,0x7ff921423cd86⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1836 /prefetch:26⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:36⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:86⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:16⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:16⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 /prefetch:86⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:86⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2796 /prefetch:16⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:16⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:16⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:16⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5512 /prefetch:26⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:16⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1256 /prefetch:16⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:16⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:16⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:16⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:16⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:16⤵PID:132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:16⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:16⤵PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:16⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:16⤵PID:5984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,17650776518324625420,11471123799781043669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:16⤵PID:3736
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\FNVVAK~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:5528
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\A03404~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1872 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a1b4dfe-f608-4a75-81e2-3a52b156a0a7} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" gpu3⤵PID:2132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2392 -parentBuildID 20240401114208 -prefsHandle 2384 -prefMapHandle 2380 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {691c849e-8083-4702-980d-5e693c9c8441} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" socket3⤵PID:3068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3184 -childID 1 -isForBrowser -prefsHandle 3176 -prefMapHandle 3172 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c4e71fc-46d4-442c-989e-3a6d4c5137aa} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" tab3⤵PID:3880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3652 -childID 2 -isForBrowser -prefsHandle 3644 -prefMapHandle 2684 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8aa65c5-617c-4103-a51e-20472e8c361a} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" tab3⤵PID:3764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4372 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4364 -prefMapHandle 4148 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9500a854-1876-4354-bc6d-aa7f8dc33458} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" utility3⤵
- Checks processor information in registry
PID:4800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 3 -isForBrowser -prefsHandle 5392 -prefMapHandle 5364 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8b1c1de-43b7-4b99-8964-71b23d4d8f1e} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" tab3⤵PID:1492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5532 -childID 4 -isForBrowser -prefsHandle 5540 -prefMapHandle 5544 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d57e9302-b3e2-45a5-aa10-ca2456888506} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" tab3⤵PID:5032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5724 -childID 5 -isForBrowser -prefsHandle 5732 -prefMapHandle 5736 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4d8e191-0e7d-476a-880a-3c8c0decdf21} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" tab3⤵PID:3140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6216 -childID 6 -isForBrowser -prefsHandle 6232 -prefMapHandle 6220 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59059743-5c9c-4647-bd4e-9313e4c8314e} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" tab3⤵PID:224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3852 -childID 7 -isForBrowser -prefsHandle 3564 -prefMapHandle 1584 -prefsLen 27919 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {095b7622-1865-450e-8bcf-85ba84b858c4} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" tab3⤵PID:3412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 8 -isForBrowser -prefsHandle 5460 -prefMapHandle 5448 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d90ac92-d849-4203-a73d-65709f2ff367} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" tab3⤵PID:5384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6944 -parentBuildID 20240401114208 -prefsHandle 7064 -prefMapHandle 7052 -prefsLen 30570 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b1edc44-2fa6-49cd-b7b3-283b3e153ce4} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" rdd3⤵PID:5556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6900 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 6888 -prefMapHandle 6892 -prefsLen 30570 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb0c7ac9-481c-4284-b449-a8a427c19f41} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" utility3⤵
- Checks processor information in registry
PID:5988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7340 -childID 9 -isForBrowser -prefsHandle 7360 -prefMapHandle 7172 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b037730-2ccd-4a4a-b452-160178e35b8e} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" tab3⤵PID:6028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 10 -isForBrowser -prefsHandle 5456 -prefMapHandle 7072 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {711c8ec2-8ea5-4c9a-b3b6-2a4379482e26} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" tab3⤵PID:5972
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5240
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:200
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4968
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Temp1_000exe-master.zip\000exe-master\Creep\Resources\street.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2332
-
C:\Users\Admin\AppData\Local\Temp\Temp1_000.zip\000.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_000.zip\000.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\windl.bat""2⤵
- System Location Discovery: System Language Discovery
PID:4308 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic useraccount where name='Admin' set FullName='UR NEXT'3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5276
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic useraccount where name='Admin' rename 'UR NEXT'3⤵
- System Location Discovery: System Language Discovery
PID:6064
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /f /r /t 03⤵PID:5736
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a2a855 /state1:0x41c64e6d1⤵PID:1052
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD51367294e47702bf4d232173949e9d442
SHA100f8d71ad38d00a0b370cae2dae16d96753a36e2
SHA25687737335107550f3489d1ebe2ace4d82423774290e022a14ba918298aed161ce
SHA512e03139a796f15062c18b25eb62b40fd5bc8a8ade9ca366a94ee5b1e68643fdbb8b9081dd40c4853d43d948a1b919fabc57581f71e40d42e90b5e336d32171bdf
-
Filesize
63KB
MD578c4f46c611582fe77c8943189de2a3c
SHA1871b87cc0477a375afa511ffeca85c042079a25d
SHA256eb15e3adeebccc2cb0357a5b468a4794ddcd9a51d1f265830fddc6464d85fbc2
SHA51225662a445a1814ba5846ce6cbc182ceeb5f5fa60b94b39297b1cbd0b4678297d459c4562b09f4dfee300528a232e302f440c5f44ee2fcb0cc72843f62445853e
-
Filesize
1KB
MD5325deffbdec5a367c2421f3731b7b4dd
SHA184b772ba131c1d8f32244b258d3be183c69811c9
SHA25634f00ea4626adf1fc62bd47a94aebb55562176dda4469aa40e8cd0d01855cba5
SHA512d2b7909a78a7817640a30e4976cac72ee3fb2d75050483c9bfc8906bb04930581def51a2e37c3a8d5067f7db15740a3cb5e5b1752a07b1bf01618d83dfeac96a
-
Filesize
560B
MD55c191bc49ffb906a91786a8cb34ee890
SHA1dc494f95d90a0779dffb0636bfeb676bd1b44759
SHA256b5f33d8f5379a616892ba9374a1e72a641291f2827cef8819a8d653c562acbf3
SHA512ab618dce4145218b6edff7ed28e43a6ca08100150758cc45bc81dc2b2328b277de05f4708425ad67d35be647651a44d2a6914d53a3c494121c2fceee0bc35b8e
-
Filesize
560B
MD58cd462059c1b63d02943802103e3e12c
SHA16ff1ff8927e3825722c1ca1dba18ddb8000affa7
SHA256791a86d54e12b5df795e29f5b8fa2766adbe88a9beb3d16dcb903f2caca755e9
SHA5126f2d29af50096b3cba96ec8221e8d6ee283c4f3f5d3605ad227e498b281048faee9eae894895202b180e1c4907541fde1fbacbbe160f545c631ee530c1eb3038
-
Filesize
416B
MD542ec5d587614a2ebb857d5d69c8616b9
SHA10e20c5af995f0c75bd4af21c87bfc2cf00aa650a
SHA2567142329e2a6dc02007a1ea648597d02615edd86b0a83f2df9916baf5cf7806f0
SHA5126b36d978378f63e581bcd48d805d1332d5bfa7abc0bd32f2f47410c822502a6ec899403c0dfc122a599246eb4d381f3282173f5c82e7e6753d4d1dee2a6f73e3
-
Filesize
152B
MD5cb557349d7af9d6754aed39b4ace5bee
SHA104de2ac30defbb36508a41872ddb475effe2d793
SHA256cfc24ed7d1c2e2c6585f53db7b39aa2447bf9212487b0a3c8c2a7d8e7e5572ee
SHA512f0cf51f42d975d720d613d09f201435bf98c6283ae5bc033207f4ada93b15e49743a235a1cfb1b761bde268e2f7f8561aa57619b99bff67a36820bc1a4d0ec4a
-
Filesize
152B
MD5aad1d98ca9748cc4c31aa3b5abfe0fed
SHA132e8d4d9447b13bc00ec3eb15a88c55c29489495
SHA2562a07cac05ffcf140a9ad32e58ef51b32ecccf1e3ab5ef4e656770df813a8944e
SHA512150ebf7e37d20f88b21ab7ea0793afe1d40b00611ed36f0cf1ac1371b656d26f11b08a84dbb958891c79776fae04c9c616e45e2e211d292988a5709857a3bf72
-
Filesize
5KB
MD53bf88f9603ac0a9b25f74687fe763142
SHA1a1fbc220a1943fa0769ceb1a0b3b85008beca4ff
SHA256ff793f206ac9c1a023f86354b5545e63a3832e555a4b1b020efd54b199235411
SHA5128f65c7842864c0b2edb17bb96263dfe68365e46e2d848c05e9e6fb5033584a24f6f299ee10c3a1b7c142004c0362ccab132e00f820f2ff1284ec992040d48b6f
-
Filesize
5KB
MD595455618ada32abf5efb581739d2204b
SHA18290268d181fc27ba42cc0ec8883991cfb5ce19f
SHA25605de2a49c7f9b9ae5835dc007202b8e856b3ac12a4f32e5a7e9680616230dd1c
SHA512d4aaa68fbd3f4a9b6059fde48d629c6a7e28e82a29e67ca92564790c24598daff7d6ba6bbb98548f3d5f30cfb95e972d96267e8d0832b4dd22b36391cee3a376
-
Filesize
5KB
MD5abc4f4e488a8ee66328b0914c58281c1
SHA10b7c4f3fff91bd4d5a10e3611d3f57b5a9e950b9
SHA256aba2ad5b2e3b02ac31e7c7c54485a00f53c7d28bfce587305cc902b8db54e8d0
SHA5124a5b7338148f212d83e23ed8586f370eed6fdd91ddd83f1c43a1b0ae164427eb3923857d65871cef2d539d7011296690780f3d546473810f51a680ac91fba242
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5be27f23043ebdb5983cabbfe6f7d183e
SHA16fbe57ce103ed62b30c8d54e06a2f250a25a67f8
SHA256453e4b9dd49694eed5a32369bd67456f171575dfd10b7f800f7337d14121c7a2
SHA512d2d60d2695db790dfd39d89e0dcddd5277f6c196fa2ed31adf081807c784fdd2bafe5ebc64c7b9878bb71063d20e6b6d8f2cc3bc7a72d223e03175812a2b4ba0
-
Filesize
896KB
MD5018cd89b42f38fdeff30a5e3fed22d30
SHA1fdd2c6c2b09ce41b52e0da56b22816028c58ec4e
SHA256e215ec54d1a096b63e8f73b37a0c1bc731b494941c27025eb35b68e957cb6b06
SHA512b84d92c63988594686172f4175300d397cd1199e9e9eec054aaaa578a0870be4ce9269e608422502b2c6ce1613a7210d394927b870ba70e0667d10aef0c8ac93
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD52722d71421d9ed7eda17073d0d67e0dd
SHA142d44260e5afbd8abbabfdb5b4584773d97bff51
SHA256f4e1980e8efef860d77587eca728d09adeb4957fc1429985fc363d41312b1bd5
SHA5123d7bcc8f7ab6e611b1340ecf5663d7ac84cc8bc3dad3304d3b50ba9a73c2c4ffe3d7987d279decb1f2d9846149ef31a2b9de63caec39684de361bf290252d077
-
Filesize
59KB
MD5c5d79c6d307209b8350d030d5504750d
SHA18ed6725529247e92136d05fbd03183a872bf07d3
SHA25655b6e97daafdc8ca8ba1f3c181c3dc56221f31f1442693a36cb600bb537cfe26
SHA5127901483bc54c5c2cfe4ee6aa29b68ca9ea0d6f8149858a3e0a1b4508bacafe9ecd3c460d660ff18881cf228e2533b1f8e58632a0d245b30fb4dfb4f1bd4fb36c
-
Filesize
66KB
MD5f1c4b428d5218168bddbb517391b637f
SHA1036efd09521d8af44769acbf1edaed903da20142
SHA256beae2976cc07531a200daff549f0448a10b6df61c10797ffd564821d9cb8e42c
SHA51296a6febbaa34fae7992cc1b8d1a6ff2cf8f2ef4ac1e4cbd0fb95687cbdf7de37cf847302dfc8b46e73c2fd8a83048199fe4929cf5e0d663d0b19cde11f502cb5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\049ADCA1721603B8D45F26690060353B7C2E080D
Filesize89KB
MD5a22cb72238eb2a3124539b78a4924759
SHA1ba5b3bb736a79bac97bda26ac88263ae3afd7a67
SHA2562eae6825fcf99870fa880ef8f8b8adfc6578a7d72f9fb577c269fd9ade954e0a
SHA512526d2bb17844fe3990304ec4efd8328435bc91ea094aa351629d70fee25bc33b7d893c1c1f5540831d981738885479dec46d0737ff4c60234440bab19d00bdce
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\1EA49C294032D90D3413795B2DA0273F2BD4BB03
Filesize74KB
MD591ba425a62bf834f14ae498a0cf26e9f
SHA1376b79e66d8a7bf4230fdc3cb5a7943abf5443c1
SHA256581e8826cd7f9d1cf98bc199fb370bd16a7420a618b1d18faf1844921d418536
SHA512ef56752d6bd714b1a12a1b156d2be4b369fa7b91266d8e9fe1e1d1354099d5288afe63ddcb616b63ebd4f785e6d77e79019d5c00cd5eb5cd637d1140b6688873
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\2492994A253B970917AF5CDF605580B1C2DC16A0
Filesize63KB
MD534ba0de585f08653e893548d18be062f
SHA1638bc7c028edcfda0996eca3a0b2b5b0e7d1dd3f
SHA256b3012d0757e1de5effaeaa70f76e7688f939606f2dd0321889c3ca4715fcb9f7
SHA512127622827a00acab1dbea59dff659496c3491fac807e7f6425b1a196f065639cd801212daedc8524b5f34dfcf0b7d629ab47a259a3b2aa65bbaf8202eb26e7ec
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\2D53DC86EC805E3FED3983CF4856BD056706B752
Filesize49KB
MD505babeab85153788025c14eef8ddb9fe
SHA1eb66ed680743a75f3c9d95ebda5778907e325581
SHA256315b317e4a782a7b9f892edb196e2a5a752ba6129d816d0359b69da49bdb4ac6
SHA51213661fd77d506131e8880b862e2f4286bf7e38664b7d6cf66ddd200b8ed866f49f200e014a3bec4828ea3c42c40bda3194f9f69ee9e66b93a612068913ba8416
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\3F692E2BA237A7E6C8D9C98526AC114680553DB1
Filesize26KB
MD5e030f30e4fb951bc05555aa7b9a0b960
SHA1cadb1b3475802fe4089071cf26ffc0aae3f5ee7a
SHA25653275039a728a185b7041d61e4199d59a10878c3e54a19edaf2cee9bb8c98d53
SHA5124e4693a7760538183310557d42f48b3c64a5924c6ace9e046519d00e8cd3e41fe85b7bf3de7b8de9d2d5d347c6e0d7dfec39cfb0aa5a68e3714cc79e6abe25dc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\549C94847E35BE89DCE95DF86EA39378F22E5078
Filesize99KB
MD5a222aba11e2e19ec6c619452917a17e7
SHA1d6298657bc65fcd465ccc001a4dcc10088ccb6fb
SHA256845964acfa7bec2606be464b1bb6c3c1b448ae28747734f52704711e57f00a97
SHA5122c8aabca7c9062ab5ad1296bc01a53b765db557bce75cdf2848fa947785b206a0ffcc61d2a881d804fd952d47d6f881df1638e2ef16c1e2b96e850ace10d4561
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\5B23235D54208C34AFF88FC6F18585FD8A8F8FAD
Filesize32KB
MD5e692d29d2584958a0285ecfc2fbcc17f
SHA1d8c4eb33e6d5203df4a69fdc90122098248946a0
SHA2565733fe80baee18c49361570d1fd287c0ce2e655233d09db4cdc954beff6314e0
SHA51247737f89289f3e88f0092d3642355a5d4a3f52c42a438487b4a22305aa6cfcd7c11709195f71e434a8aeaaebb1fa124a263b45135eaf3f1a1749e5a72e42a56e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\5D1D0B2A591420FB0783D8E29A45FBCBEF208CD6
Filesize112KB
MD5cfce86c15a019cafbaff22ba77d20cf6
SHA19f057e60fec30467bf0a64529797a9acbac2a148
SHA25641c7ba10e46bd9392ca3e2f49a5b26456db47e9a522e5104312ee9f0e664144f
SHA5121138fc63b7c45313f85f8d32a6d705b34e840e3c8c96744dce1886be8edc053150751307e8acbcd630797e90993576a7e3e9b12ebdd0f5d4b46d7469c19d2687
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\5D1D0B2A591420FB0783D8E29A45FBCBEF208CD6
Filesize126KB
MD533f6af562072dfc035777c99217379ba
SHA1afbfb71853ebcecec85258a79f5d412c236b4e3f
SHA2564db6520b4cce4d32221b29eaaf9d0205c13fa54de558839b1c14e964c09e575c
SHA512f5d4e481447a26c87108c9e2104b9224f39b712e5dd50145fcb339addf416e515acd3204b2b0373bd62797f70f6c6665a10ff96a5f77012532b340107e689ac4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\79EE197532218B81AF7116E5AE64FD81B325DE1F
Filesize1.0MB
MD5696be7103cd08ff039d782c5386d3d2c
SHA1bc34d188c73abaca9540b7401f25777438ec1f83
SHA2566ef5f6c98c71e6957d0e17a9f74bf7a1c036b96ed65eff1ec963ba7b9bc33035
SHA51253eca3406d1d7edef50e9a4fc29268e557e2220e07b081bf8a930be17b1defd6dca0d7b42117fbe8f1ef651ba24a46ed90c5c7fe1891cd035ac91c69729eaff1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\9821E2BFE284EDCD7A905CCDEBB1F69215E5ECC1
Filesize5.6MB
MD5cc58b96fa3f111efad77a4457c989ae6
SHA1d116a16002df770d3ec28ad65d09ba3337522aed
SHA25631ea61cdc6c51fa3293d8ffe78501bfa2aa3d34ac058b976a91b2829d65ebb2f
SHA512d0c526f7c62bd50695de541df5cd417467016b8651349062df664576dd2ead5acb98df76a3f54ef2d1769bc0ec28955f48895a9f3f7d7f7e98bd2e44afba26bc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\A03E3E61B5B0A23F2BD68515B245FF480863548A
Filesize41KB
MD555498bbc04678eae25b320462cd432ec
SHA17abfb25069ab0d0a5940826c10f41913e3d9e33c
SHA256e0189ab6a3807396f600204b96739f1cd88ae809e013a8e85f01d45e85d42f5d
SHA5122a3871bed020aa07add85c64b0299bfbed3e1b842ab2f761e4561b8b6144026ee5bc29baee9cb09e83be4a7d23e21ce0b4eba7a8e0a1a0023314b3b211d313b0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\A4F0CD7C87F397AAFD75A245C43599943A2A40F6
Filesize107KB
MD5e8491e300aca78e38fe3f17eb7d0d410
SHA1988e025d373ad5af0ac71e31075f4e347fde647d
SHA256f485967ca48fbbb8f847122f496d58bebba02ccf06f57b2c9e8b98e5b5ef3dd8
SHA5126925b795ddfad1667a6cf40b0beee203557e0a01d25978c27881f106b7f42595281d474593d475e117523b11431be6b2af8ff4fefc6b5356ee0681a1b89b14d0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\C137593A6AC2C888ECA6F4CFDBB4AB562172A494
Filesize97KB
MD5fd8785fec06f319d883527b51e2e6cc7
SHA1457c143c629530a8ece4cfacb2fdb7c7cb45122f
SHA25628010448a00e88c86dffb57af1213e3d395fee1481b7702900def484e665a910
SHA51216514a64f52bf39626709988b302e8628cb7b943f3ecbf59e93c31b8c2b663193adec7da87bcc5a365f097a9aa56a1520ec6a578503d63442a0553cca28a9c07
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\C93F59131F26430B8E189FEBC8E637317721CE6B
Filesize93KB
MD5a6c498b24a2abba6c065b894f3533129
SHA1e19dd1f05fe5651f3e53e2b4613da083d489a091
SHA256891e1df7dd76d96039a41efbd1d340f7febc59517342a524a25e54aebfbe12bb
SHA512925f79c974a0a26f12244890d81e9c76081af49dda0ed53eaa68cc52c82ff84598da1323c340c05cfc58b5f9563f581942f9a3739beb02f7411dfd0ee4b1d0fb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\E8BD986722565A28F40356B72AB577075CED36B9
Filesize111KB
MD5cf18d632614aa333c74f968c6d286316
SHA1c6c11d7a80acc375719808d70a6e270a864ebd83
SHA256d776a7be40c45a91877ab6def83671f76c3df4b3023c8e4ae04e37d963bbdd08
SHA512ef6e84687031c011e0d0f36fac677ea08d5aced5512f6ec810a4dfa4ebda28e5307e6b80f47c30b906f4ee1f13aabdd8e8848e135320743b93eaa5f1b9a41d59
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\cache2\entries\F5153B1CE7F244E6AEC0B8F09548F60E56AC1FCA
Filesize174KB
MD598e19803863bf097c0088fedc1f87ea7
SHA15a083f311a74451a660c15e41582dbe778443c47
SHA2560ffd73a7bce1c2bd26a0cb56d970a2407cf83c3e12e07ce07c095de8d82c2229
SHA51271b1461c9b020e4216dfb1f911270d4e55c4e5eb4602c16a3cf34a3d8473df48d5ae11abaae214385609e19116ec16de6869ba0706ea0407cece110006b1493f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\jumpListCache\K5iqBsVAdAQPUyUjdYMjYG9V6V7fAajaabGjCoay4bY=.ico
Filesize25KB
MD56b120367fa9e50d6f91f30601ee58bb3
SHA19a32726e2496f78ef54f91954836b31b9a0faa50
SHA25692c62d192e956e966fd01a0c1f721d241b9b6f256b308a2be06187a7b925f9e0
SHA512c8d55a2c10a2ef484dedded911b8f3c2f5ecb996be6f6f425c5bd4b4f53eb620a2baccd48bac1915a81da9a792971d95ff36c3f216075d93e5fd7a462ecd784f
-
Filesize
403B
MD56fbd6ce25307749d6e0a66ebbc0264e7
SHA1faee71e2eac4c03b96aabecde91336a6510fff60
SHA256e152b106733d9263d3cf175f0b6197880d70acb753f8bde8035a3e4865b31690
SHA51235a0d6d91178ec10619cf4d2fd44d3e57aa0266e1779e15b1eef6e9c359c77c384e0ffe4edb2cde980a6847e53f47733e6eacb72d46762066b3541dee3d29064
-
Filesize
76KB
MD59232120b6ff11d48a90069b25aa30abc
SHA197bb45f4076083fca037eee15d001fd284e53e47
SHA25670faa0e1498461731f873d3594f20cbf2beaa6f123a06b66f9df59a9cdf862be
SHA512b06688a9fc0b853d2895f11e812c48d5871f2793183fda5e9638ded22fc5dc1e813f174baedc980a1f0b6a7b0a65cd61f29bb16acc6dd45da62988eb012d6877
-
Filesize
396B
MD59037ebf0a18a1c17537832bc73739109
SHA11d951dedfa4c172a1aa1aae096cfb576c1fb1d60
SHA25638c889b5d7bdcb79bbcb55554c520a9ce74b5bfc29c19d1e4cb1419176c99f48
SHA5124fb5c06089524c6dcd48b6d165cedb488e9efe2d27613289ef8834dbb6c010632d2bd5e3ac75f83b1d8024477ebdf05b9e0809602bbe1780528947c36e4de32f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
771B
MD5a9401e260d9856d1134692759d636e92
SHA14141d3c60173741e14f36dfe41588bb2716d2867
SHA256b551fba71dfd526d4916ae277d8686d83fff36d22fcf6f18457924a070b30ef7
SHA5125cbe38cdab0283b87d9a9875f7ba6fa4e8a7673d933ca05deddddbcf6cf793bd1bf34ac0add798b4ed59ab483e49f433ce4012f571a658bc0add28dd987a57b6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\AlternateServices.bin
Filesize18KB
MD56940b2281378143d3ce5f38f0bc4c48e
SHA10bf736393052d3f977e94e4c0897196d75e062ec
SHA2560a13e23d96ef1c8dcd420e805e16f80ce4f75397c001a447bd3caa1adca65478
SHA512b159ba057fb7439bc89d423e83978e351e06cfbf461f3e6c936aa6e1c6aef54c2778630f2b4497683b14749131f1089b1f5238d39ef80d6b94d6f3e64a2edd77
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\AlternateServices.bin
Filesize8KB
MD5a31d8fe052acc24a316276b2fa137d50
SHA170fcb3d977fb6a52cce31b52b860fe6b7e49072d
SHA25685ee3d80d8a1faf211f7727c973b046cb8e203f0bc2c4fab2858b6f271700160
SHA512c924daae5c83ec8a1f65b3b3a964acf84ab67659faa83fd19217772c13be1c053d99be34c71b08f370cb3a36a89b367d8c84a49660ab046607aa1f31c80698cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD592fc13e0f15894ad6278d18bf1fd2553
SHA11d07f7c728a63a73e035079e2eaecdc843891112
SHA2561e4de2f42b7ab6228271f34cd7d023c81c22f5b4fd2a353af0202149c69fe5d0
SHA5124c290127824131fcdb2fb1d95a5ba46fcbf8e168ed3ead3e06899eee940ad4371028c499b9509d15d13a2641d1a449e4bcacca4b6a2be7231dd7b50946e3e969
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ef3c09931ef70369969e2953f0b594cc
SHA120e08e3e7d344b6fecd209d38a9d70491a88bf7a
SHA25698050da64773f777facf29405be379de1e6c2f1aa7a484af77f38e233652a000
SHA512a6211dbc74c6a5fd81a85fd4de18ceb4043c988f2baf3711c45eaf3bea4f42db95148c586689a107a4561f915abade2328f946227d625a41e615411d14e32f02
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD58f63135ee5600d75c842aa860a3dd7b8
SHA1e40398bdebdda1a2a569834630cc1cfc4fa0e784
SHA256d69242a04c2a1474f2818f90f20a8902d9062535ef0340141f4092cceebd713f
SHA51298af0ad5d638537b41ed3c61d322fb3ac2ef5c4b22cfbf41fdd50ebe5c4134e00cdbc29556c87266b6a7f5e8acb355f5fdedeed3a7f02c6c4d7a3a22b077e8f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD533cf7fe124dfce9c31711afea687368f
SHA11973e180598565cb0755bb9a45b83a6946545369
SHA256ffc678ea540f24d1889ac5b65de0f60fad0147a699aabd618762fffc0d1f9762
SHA512c401715ab0e2f0f0e57cee50a25828fd93cf688826b25b6149f2dec5a0355f2f27a74291941a3cfcfb2ed795f0ed157e97831d43feeb01cf1c570aaeb44ea467
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\pending_pings\3346b854-15a6-4efb-93b1-e840ed9c12c4
Filesize671B
MD5aeefc5cf240a664cab26c6d998f690d6
SHA1ef0e76cf3ff4b29c91a291f34e46af4ee4d84f30
SHA256ff9949e5a6773212a600a7347d346f8ff31c2d38b7f3338387e151c603970a05
SHA51229b6d83b68078ce722a67a41b3d8e663e79832d22f6198cb5e9ab978c8cc9f341029439ec5fb10f2568f73c7c95e7066b344d7231cf48525c2e05b3e3b016aae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\pending_pings\b07cff06-c42d-4662-8c3d-cb5633b43a13
Filesize982B
MD56531f63b069c7df43ba297701041d3e6
SHA150d6bdc7aa45e8cf0b2efa1d189841b6db63ee4e
SHA256eb048a839fde3bdd77f33e7ea94a247595a8d6a5b6303e0ccc65bff6cdfe14ec
SHA512d9c5e2238bf50ff8bede525976ebca583de246743bd249f20bbca80644e841b594fb2271af79d0a890194e7bbec58a49949172f10ac721c52458322841341338
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\pending_pings\e1648cf2-8a9d-4026-90d2-db24e601beb7
Filesize26KB
MD5f309eb9c9a1041a2f10ce3e98ae08607
SHA1f67eaa8f4b7d56a71b176e43b672ee40ce2e044f
SHA256f1680e290b6253fc2e3a44b22cfc4afafd8aa694f1dae222465cc72d47549b4d
SHA512ccb2635421d9f8302ec72f66e72c96b631a55142738305a3502f29fd485c605e065c2688004c7d47ae99a2edb1533b83636ead3e7fe4c90e8034ffe6ec4219c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt
Filesize848B
MD5d57907a1567f6dd1016c6f99d6ab33db
SHA1594043f1115a9d96f5f61d264a3b2663e2a55e13
SHA256f5fee048196d842d42ecbb024f9c8c74451925535fd47821f71e163311e35970
SHA512875b592ffae3487acf38f3c3c1726a6ff4dce6ce4aee28e346d597b315b22fe0485eb6bca36f41d2576a13d9b6cac2e57f1ae487a887ad99ed86e500e8613ce4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5005319234d3690e3b5e762b0c6b99596
SHA13a6b2236296357ff8d10a5e8ae11fad94dfe4663
SHA2562cc4ec561e173091ca1d2ea48a49c7d52fcf98af9256d190affa669e34b24c6c
SHA512769faa01fce760cdc952c848e435b78b04da87358a32218c1a95f534b282def2b7e7dd3e357565c66f68fae986b0152ab442056d354093574ba90d3e9df7265d
-
Filesize
10KB
MD5c241b2909a9082656622bdc8521cfb70
SHA1cb5916d56a1c053162b713f30160439e630e6997
SHA256e6eb3e8bbd250574fab7144f6c50be08838dbc5d4a4c8e4b8e97d2139c4bb586
SHA5127f7d6750bbe02e71ca0369ea6cf58d22478371120f5dd83da2ad9dee7d48d8d0dfe2a5acb1d5b6177a7c9bf03a1284ffe60997c63528df46bb58dd950ac0ff9c
-
Filesize
10KB
MD50e8d5871f565fbcbb976bff31085d453
SHA1b6db971ded5f1c058359ee4477928588ead340b0
SHA256a76064109e55659be8d7d431e2674856f6afe5b46b6bdad60a3eb5824e91a70a
SHA51201dc3321984790307ae1861620961cd1216be34f7536e231e888bb0bfcf4e33c6cfa0eeb141f97c15ddcf5543602e62b0f825c3d7cab4ce60a27953e5a7df56e
-
Filesize
11KB
MD51f2a2f5b3bebb952c95de71f2e81647d
SHA1e2c4f86592104a4b3d0132f6292bf2978e465e96
SHA25669973d61e52306ed2e7a486409756a75808609f73f77cfe17804eec769c2ddfc
SHA512579f6c61f9f9c718287bca22c09764889ab84150c92780134f9b80eb683b9481d07096a752e6461fe45c2981af5c9daa6f93a0837dff2751d06bbc333a4f3541
-
Filesize
12KB
MD5a7f1b84f07e14939f739851146084336
SHA160aa8be1e8268d75415e4b5ee7587b6ad6df23cb
SHA25605f5e9db0c765c9c13782edf4d4b956734d7ec80d884945a4f5ec379069bacda
SHA512badfcf3998bedd87213397b9507b1c75599eed87ae0b2e5d411bb9be382c733c48e2f1fb873ebf8a9b86caee6c922921769cb61c7bb95e27c35535ac182007de
-
Filesize
10KB
MD53df927a925d28d47f8f2c2b41d5fddb9
SHA1b9d717f7932527ca4e8647b71f7183ad0b688f2b
SHA25697a3f85fd381ab2f2134d8ce508d80f2b83020d308fcde57027f004a65aa2ac0
SHA5122ceca713cd30d422f46a99ff9eb31fa9e4717dd560052f806fd9cbef8529254099d49c867a9f7f94596faf400c605cd37ab249cbabd45b7b36f0eb196bcca289
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5c8dc58eff0c029d381a67f5dca34a913
SHA13576807e793473bcbd3cf7d664b83948e3ec8f2d
SHA2564c22e8a42797f14510228f9f4de8eea45c526228a869837bd43c0540092e5f17
SHA512b8f7c4150326f617b63d6bc72953160804a3749f6dec0492779f6c72b3b09c8d1bd58f47d499205c9a0e716f55fe5f1503d7676a4c85d31d1c1e456898af77b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5438916247aff149ff2169bae1facb5e2
SHA1c354296140545917bf9abcfe2794aac302187b20
SHA2569a30c25a8e418f9318f0c33b24f72d47dfdf6609a9c982ce4e6bca4d4f48d91b
SHA512f557a66e1f2436b8c21368b7eb15153d22d30f4f6c11856cb5fb6b4171e7b8ed531a441387c08482ee30b8db21c452685aa70372d7a0433c4ec8193bf226ea94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD5eb715ba92b711bbba2ab54ba6f4ca848
SHA187775aba54b19b6bab9b2c26ffcef4641462523f
SHA2560e909106a3e504ede9d8af2a07fc91c8d633d1c9bd674c29949c2d5ce2d040c6
SHA51297a409758a8c55e93b8cae44fa2dbac639c36edb9d7cbc34feed46a4aa2dd40c0c3e1a7fa6d726c1860f193e6cf53a7bb3265c644838569774c3544559509cd2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize11KB
MD5a61392c3a7a7b6fe20bd6d0d1ab4e1e4
SHA17e19412ddbd013b2c7532dcf107e068e9fc7074b
SHA256cba64127d2e73f10ff375f001348a6c7488c5907af758248f9cacda8fc04937d
SHA512493c54ccb151ecc5db11bfb89f341c1e7cb8ae8a47c85b3632cdab50c59e01f1bcfea8697ca52111c39b4ee78622773fe7ede54b96910afaab8f223490c2f276
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize12KB
MD507cc48358091cdc9bd80318d824ace76
SHA1b9fb21c13572999f2b57dc5aace82b266eae0a99
SHA256c678ce45486029aca417b68d7a30bb37e301b662f039a22f616fc77c5c9e975e
SHA512991f9d1a5bc05e9cc28ebb97c74685311a59297fa09d70fb24503a45d2320956893eeef54b73c0860e2bdbe9eb2d015578abb2709c98060707f171c49bc471e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5f5f154a4d5c19b438e7f2c10e556c81a
SHA17c23a6b2d18d615b7c8b8b24762a5ac1bc21dc36
SHA2565ce2b06fc9df9b8b57c5c8ba29fbc459f61c90735153f0d1dbc60ebd61fe2c42
SHA512c7aba5e0a5650ada00a0efe1a346ba912f7cbf6f9084815ade0e79e82e22fdde0261b556a8bb7d623db400557a76760443e627544654ded3518368efb243576d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD53aa7d09251169f77053fbf6e10885d5c
SHA18423e24a0c0e6f58093b4abc6af63e506bcf0015
SHA256aad6b025ffb652e252f37790f6107d482c3750018d3f9e17d9b35b516d165c7d
SHA5128e342160a53ac04f69e1aa520f36974a87fabb21d760064c4b06ccd93e8f3add00310e7a0b2b8835cacdec7c1810e25f61e89e86502dc7e6a665ff2a42d3ef25
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD59947474bdf8776a5ae804f1c8adb0a64
SHA1bfe31313ae4cb4e8e0528fb65cfb253fc4775413
SHA2568291e14ff2628a98405f8649a950510f7257c332f4feaf2730c10de997a3de78
SHA512359f3bc2d7d6a2d042cade8ecd577710b22b998bd388eb3fd7ff72bd58cf1b43e3d2dc98cfd8bb00669d32f4606ad73aaa6beda5569e51afbc0b841480884bcc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5a401b81033aa87bc97ded5a674fefc15
SHA1f6008d14d7aad798fc246eaf98d1f406c62eb9c9
SHA2560308d0dd37d4f1127796c728832edd61e25ccb8bc07ab3e340aa88302970c787
SHA512d291cb8759b98c2fe450600ce8ea93b10bab9ce882f96f0b410a59f99571bbc076e10a815e6ec3048bd9827d4006456d8e3cb7c9ed5333df8cc8d7debcaec79b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD57c5f7fce2104022d751a0e8d445e9074
SHA132735096e0fc69290a2a2b82839ea83ff2ce7456
SHA256e179e97650af669830eb1a250a99233b180de3f0ca05ebfe42795773bafd0d37
SHA51257ecc78dfa5c0ebbf8bf1cbcbd35b9cadf11fd2529825d6c1333081194c0cd7dc901a771865254b4f535c5e48086b34a020c32ef001ed32d22c67dc7284b3455
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD5daf8b77f08166154ae6e689fdde415e8
SHA109058f2ec044f3adeefedf81952d138038d40a75
SHA2564bfa0029daa421120c333c3b4088592863bb1c38802872f543ad13d6f69c6d97
SHA51283af1355406dc324d8112aacd8db19e318579aa745d0d5e0184fe115b6a0621284559d5b152dd14f71bc71d7333f4c83ce1903fb32857147348ccf0cd6aa1824
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionstore-backups\recovery.baklz4
Filesize12KB
MD5e7893a4ffdea45f303f8aa5f49c9b2d4
SHA163634a28b1bab2b41a615f9a78d8ce12c6a2b7aa
SHA2565e449c45bce93ea1277d9ee6a6db858d4c0b37138789043ea429292e5b286d16
SHA5124a0f81069c186a5c1ea9ab139acb76b445c7d537487556dab203d0f69c2fdb2147237baeeafafb4b1d39e8d67c2a5cc9855b4cffdab8d188e4b1c96b8bc667cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\storage\default\https+++www.youtube.com^partitionKey=%28https%2Cgoogle.com%29\idb\2171031483YattIedMb.sqlite
Filesize48KB
MD5b26b777557fb61a29fb999feb2178321
SHA1038cff6727f03eeb3fb6b149beb5ed5130583da9
SHA2565732aba241311b94368aaeb535daac0cc3c83f8d422ad18770851a5c4fc2f39e
SHA512438b8ec19919416650adc07b880e20d526273dbfb17d73ccf4df7a2d964af934a8f7d5440d23be66e4238bbc4a8b3ac2fdfcd7af3f0eaf44793561cdda909253
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize376KB
MD59fc8f756e7109adfcefee2f252c8300b
SHA188f20402cb6802b94589612c110a2993862e7483
SHA256567b38083f0484e12bb49e9c083f8d2f325ff1636ad6c387f002b0508a8b7100
SHA512c2ac8a2bc4e3d2cb35ad22336e3dfb04f136d4491e532a78cbbdb6f9e0331c88031f4be1e8e307c2cfddd7aaca7ea59adde777d39bd8ab4915a5abb8c0bb3092
-
Filesize
846KB
MD5fcabb94c44263b7de3bbb2d369e1e201
SHA1f64d9c54bc29a0850567289672ab216d3add8157
SHA2562517a770aab8bb73049b255ebc6ac23263405b69f9c008288c5e8f6c174096f8
SHA512fa133d38447e2a724406b5eaf335147abe2cae8773c23e33a1d8a940e884c9dc54684a6d478dd8c6f0e9d1919d298b798b548f313836c789fde37b7352e18095
-
Filesize
400KB
MD52d9a58f3843a1fb584e40fce0399800d
SHA1773838cf2ebba495ed40f2cdb3315826464b9b0b
SHA25637cfa1ef659cf4a57476b2862c128f838a713dc31ae4ea029c335a3a2f451df7
SHA512ee74c5b967399db09de7c1e6525cda1ff172ab2e5fa3a02f2daf0ea92375985deaf92e70e1bedd87b11893251212dc68b9d9c96b685cc40a06be548809fea613
-
Filesize
752KB
MD5c9d2e758b25705d2f4ca3721ce7c6602
SHA1767c6978f55eaf615732d5d6562d2aa17c92b881
SHA2561b0e19248ec109c993e70a04b42360966b66d94f3af9a37ba9e9aaaa9b9ec3f7
SHA512f7e4c2f14d5b4c87be81030df4b3bdf43fe465c2eb1c04fd2ef2d26e260ddfe2edb11f0d89a689f9834e9db3f895fbee619dc052708ba178702bd475fff1d7bc
-
Filesize
917KB
MD5d7565a7cdd8770471b30ee19420bf91f
SHA1650a3c4f6697528273f9b4162b9072c0754a4945
SHA256d97fff24c8d5eabc28c7f935da3a4151e73f2f15029448344f231034ddcf640b
SHA51283043591bd378849d8d25b29ec5c7d9a1abf3b51788b35276bbf85a47fbf9d166900eeb8ec13f6a3e124768ef919e87bfaf54e099e03b66abd59dce3c60fc884
-
Filesize
658KB
MD5d151a7cacf7853319c81f09d4a62136a
SHA17445259399786bd362a102be880c9f282d1babeb
SHA25659303fab95339ce3501d41aa8005555f18ae7a291e6eb42a1a395b29965f3ae0
SHA512f3652a67611156816cc2df06c63993a0418a597a498c895ac17587e1ab8d97b1271ceed45b7a251f5560e493aac2a787e1c717df416a39b0f3abfe7e2ec7b70e
-
Filesize
870KB
MD5e31d50c9072782b08b5b8bd18f9e3e4b
SHA1d5a0e756a021f1b8b6cbe5ed6d7d464d790e2911
SHA25676a870c6ae7d89b2abe6e9d055e7faf9b350f74168247e16ff99c5982c010c4d
SHA5122a676ebb222079486e1387699a7fce162fff1fe2287b23ea2223e3e71ad6de57ab1e8cedc4c65485dc5a2e3255c4cd963126360356b3c5deafd979690c5fd160
-
Filesize
799KB
MD5dc7393415fb4525378dcec63d54cea97
SHA163ced13602a71545520e9109bdc692499cd8ec24
SHA256ad21f2d76e94bb949e07e68f03bf600b9387fa6b974cf0c5956bd6f8a96494b3
SHA5124749ab415172e0262be0e717632e7c3fad944bfce89f3c2ec8c6b9f1c0db4b86c0d96270fe0cb7d0bf39188511ecca6f8ab84524d2c1ed9738d92a8d82bb4771
-
Filesize
119KB
MD5f5d73448dbe1ec4f9a8ec187f216d9e5
SHA16f76561bd09833c75ae8f0035dcb2bc87709e2e5
SHA256d66c4c08833f9e8af486af44f879a0a5fb3113110874cc04bd53ee6351c92064
SHA512edbdc1d3df9094c4e7c962f479bb06cdc23555641eeb816b17a8a5d3f4d98f4d1d10299fd2f9152d30e3fa9e5b12c881fd524e75612e934b287109492ee1520b
-
Filesize
139KB
MD5231e43822c7395a66e560c6fc373498f
SHA1c754ae6aa99606a662bdc8efcd75c112927e3d0b
SHA2563f28667591440722fe868d568c2f0a325412ee0fa89d2d959e3f83c9a54c7cc1
SHA5129fbf6384c7a510ac6ee4e658d464bc88138a6ac4a0b425c72d5e6a987894254f9ab5e3d19bd43b231468fe74bcafd380ad244f1b49403f5584767cfd37b0c1c5
-
Filesize
388KB
MD5a0340430d4b1c1f6dd4048ab98f2e4b2
SHA1a43ff275972b4ed9b7f3ece61d7d49375db635e9
SHA2569b1622602d4ae8196316deeb91fbdd1346a4b31453f3762be119e24c84827217
SHA51254ca85bee0ded2a742c767565159c0e3121d8cd1d97cebc751d067b1ea45d9fca86b6d5acad5b472eddef23d20afcc8ae3497cdd411fd9f393d80e0c90f2cd8d