Analysis
-
max time kernel
300s -
max time network
304s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-12-2024 11:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1lI-IL0gg8WoRTc-3cazYsUkFjjstyCRX/view
Resource
win11-20241023-en
General
-
Target
https://drive.google.com/file/d/1lI-IL0gg8WoRTc-3cazYsUkFjjstyCRX/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133784758163762688" chrome.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\AfterEffects 2022.rar:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1440 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4100 firefox.exe 4100 firefox.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 4124 OpenWith.exe 4124 OpenWith.exe 4124 OpenWith.exe 4356 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 1440 OpenWith.exe 2212 OpenWith.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4516 wrote to memory of 4216 4516 chrome.exe 79 PID 4516 wrote to memory of 4216 4516 chrome.exe 79 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3088 4516 chrome.exe 81 PID 4516 wrote to memory of 3656 4516 chrome.exe 82 PID 4516 wrote to memory of 3656 4516 chrome.exe 82 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 PID 4516 wrote to memory of 956 4516 chrome.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1lI-IL0gg8WoRTc-3cazYsUkFjjstyCRX/view1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed82acc40,0x7ffed82acc4c,0x7ffed82acc582⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1772,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1764 /prefetch:22⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1768,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1824 /prefetch:32⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2192,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1840 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4436,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4464 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3612,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4344,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4484,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4272,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5560,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5720,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5268,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5440,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5708,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4580,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5172 /prefetch:82⤵
- NTFS ADS
PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5568,i,4083726971023186807,7214547110725832424,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2736
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4124
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2648
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4356
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\Downloads\AfterEffects 2022.rar"2⤵PID:772
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\Downloads\AfterEffects 2022.rar"3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4100 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1920 -parentBuildID 20240401114208 -prefsHandle 1832 -prefMapHandle 1836 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {132293d3-ee36-4ab9-9ade-31b6fa0cdac4} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" gpu4⤵PID:1988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7266f8b2-771b-49bc-9a65-6876304f05f4} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" socket4⤵PID:2592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3280 -childID 1 -isForBrowser -prefsHandle 3272 -prefMapHandle 3268 -prefsLen 24739 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ec179ae-399a-4e58-a0ea-398cb311d621} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab4⤵PID:3984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3680 -childID 2 -isForBrowser -prefsHandle 3672 -prefMapHandle 2600 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af1acc8a-dfce-4947-ab18-4bb4641ab394} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab4⤵PID:2788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5104 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5116 -prefMapHandle 5096 -prefsLen 29195 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ee29100-efb0-413e-9a79-2cc92ac14c7d} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" utility4⤵
- Checks processor information in registry
PID:1464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 3 -isForBrowser -prefsHandle 5312 -prefMapHandle 5432 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2b3fed0-2644-40e4-a4fc-073ffe3d9cbc} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab4⤵PID:6080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5684 -childID 4 -isForBrowser -prefsHandle 5564 -prefMapHandle 5572 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a17637f-7502-48b4-adfb-ef569b93c66f} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab4⤵PID:6104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5676 -childID 5 -isForBrowser -prefsHandle 5312 -prefMapHandle 5432 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b7a5220-36dc-44d5-9adf-83e0e06dffae} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab4⤵PID:6136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4712 -childID 6 -isForBrowser -prefsHandle 4736 -prefMapHandle 4684 -prefsLen 30451 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3bfe9327-0e5a-4f5e-b452-2cdd97496a6c} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab4⤵PID:1916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6396 -childID 7 -isForBrowser -prefsHandle 6388 -prefMapHandle 6384 -prefsLen 27998 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29d9cf4d-aad2-4fb9-bc75-ffc627eb6a2d} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab4⤵PID:1044
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2212
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:5588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8c12e0b3-e7d9-408c-8663-3df5356710b1.tmp
Filesize12KB
MD59f58e5c79629d3cbcc0ff852ca0e6566
SHA1a2d920e7b9d2804336ea7fed5931762e6ee50cb8
SHA256f0329a0787ece8648f1c31661dc1ca0251f0119c8118e089977d85476b32875f
SHA5125859f5c6f2a1da38d86592f303a11d8ae0c6f8b7286ac975dc49ed7bdf54c52c18eb5ade550c70cf4a73e51a00fb056686f4b317541042959cf785fec788d538
-
Filesize
649B
MD53e52fbb96850c42eeec653806f70d2be
SHA1663afc4df918e2a0543bd76038b9d05a0ac82ba7
SHA256c42f77e52a096b4b9201c5efd334b61029847ac91d12cf0229daea181b688cd2
SHA51275dc7644bd42636074a800227bb7f6ecac785693f778c86ba32accc7fc2baeb1d0d865681425583d59198acbbbf8532be8009edd0857d252d48095696fde708e
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
504B
MD583f6f3746ae41deccf13ad3a84531283
SHA12d667d9a2e779cdbfab4aa71830c8ec9fee99034
SHA25644d8d5d8c5091f9fa04f1d6ea8136b4e99519a3f71a2f9bf2bad16140aa78bba
SHA512acfd50e9e38d60950825cf025e4a7f3a4f584aac8d033c57fa655d8104f59e86b8de1c9a7840efbd6bdf28e3b2307ba52385f230c1ecaecca22ff8d700fee132
-
Filesize
408B
MD5a55e0590a29c7ffdb8bdd25239171540
SHA1d5296ff173deb7307c502dbaa8e2a1a4d3791cc8
SHA25653ce47a0fa21dbffa22f22b49819e65bb70ee33df011ed83eda203ce21083a0b
SHA51227e2ad9bb55bc4af386f57dee07a548f076f5f6c7047bd1644c7e072b6220fdd28817d819cccea74776c57e94bd7a5e1ab5251a1841a41e13587cf2769a3f7c8
-
Filesize
5KB
MD50646a35b34d90b45fc224d33291d95f5
SHA103f4dccc48e9d0dd119d4b75f6b243575a687cbb
SHA25680e3333681b080b18b5995640da8498e5442a8e50a9f94badef7e30d39a7c5dd
SHA512585d2a3d949d80aecbe5fff173753a3017ce9b14b8304ad61f980b61cbec7c488771e1f37cbb191b449503052ca6092f0245c430051f0a47c16f3f4b220c9b3d
-
Filesize
6KB
MD52249b6db28fb62d2f511e9cc06a6b1be
SHA16615423f76ecea46cd6ec52e3127d5823e9643da
SHA25673cd6707c27b0e725ecbc8fe10f57b5ed94acfa247484edfb26a4970220b954a
SHA51255b227bfea2f2ef25305b29c21e4c240c8213f0ad05c72f097894ffd4174291b70f486d5188982ab0d3d0705a46eee04b2b69f00f0ae3a8c3746b2a2a4625e2a
-
Filesize
6KB
MD56aa87832584315a20379328c88ec71b1
SHA1a174cd8d38007bd36204e2c91c850f4e84ed9709
SHA256509f3cf6094fd59c4ba7a429a1e90de190e3215bfd6576196a6be3b45047edbb
SHA512ad7bd07c14c996dd8975ab35311e9d547629ffdb9a9ed15414e87986c7ba2ae10f62e302a8c04c62885943b750f9bc05d6fe1afe303dff930aed5e147c64333a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD59c64ff7b759185ade1052c4f3d6e08b3
SHA10ecf0322bc361bd69080a76be2e433101d6e24b2
SHA25611e00343c982a448ba6c783f8cb94cceee24006fab88f9d5ff037cc356212bad
SHA512983bdd24703e73fcd72476ea7f32129a995b37c5958939df6326c0bc48a2fcca30a8bc5fb846e3d164afdaa906e9536ad92727e72928c31ff0a5509adaa568f4
-
Filesize
1KB
MD52d382cdaf6a8305d52b504ca9afb7837
SHA1e0c406eb6c32031a8806e946f623077c715d1c92
SHA2561d4c38ef36bcdabb450b574129aec41a97d71d36eef70f8292be13dab1fe3c1c
SHA512cc5cec7cb6963981539942678971cdbac645c0de829f3a7f46e23b3635f17f7730b71560e26f94b0a2ca7a60fb5b32f793ac954e5a852bb4e45ac6e2168da2e3
-
Filesize
1KB
MD50a92d94e4c6c01d110c368e0aa00d217
SHA1f3fc7d844a78573723cdadc7fcde87a84601f755
SHA256a7bd0ee1366375acad50c32372fc041fbd76dba6fae60ece153eb9dab3ce860e
SHA5125d457ff6043cb4fa0a9987886af5501281c1b9c1b79e14ea8e81a9f7f8068201b76e45c8d537c540a6af6b9aa52b4637b52994ef71b5ac8c5ca75e6e3e8b5dc3
-
Filesize
12KB
MD5ab5fb3db3c82337a748c00d52eb53775
SHA1ba0e4d7723606887c1be329973c7c493cdcf09b3
SHA256386f4405c038ce821aea6222bf51fdf538e2fc5c66f00d00bca2b4e0164b9ffe
SHA512329e301d1f117dcb5ba6d33391fa4788530b5cda88857f87e7e5ddb0c91984b55a75530f7f7f22fca078987d3b13042d161232cba777f2769be789c2c4294637
-
Filesize
12KB
MD5440ec934b0bb47c0b2ec578a35e5037d
SHA13215bb396d79457e2b2f69eaed8e9034ebe8a20c
SHA25621cc9fc53229ff9e13b613b4dac8643f35ec1b32b0512b5e0f7c5a4b3cf6d390
SHA5122998461648d85b6598b5d25b99f7323fa884907acedfea860c6b7872428a8dac6dcb6995b1175ea8b74b5092f3aaa4564d723b0ee1f240796c84afde88f7a670
-
Filesize
12KB
MD555be63aaf185cfe983a07c1b073f3dff
SHA1e89a0f7b1630d1ebde83938d3cf88220d792a46c
SHA25691a78c57d7720317ee2b4b441ab00d84748aebd94a016a2462ec07688bf12601
SHA512a4649132663a681c711fa09c4c3b02eb4339172dc447e08f3aa49a7b72a4805c1ded1ce098cd4bb92fa5340b7c75339e4e5a9e55804c6f1b9b6627aa213f09cd
-
Filesize
10KB
MD5fad845dfa2ef72c33524ce11b21c1ba9
SHA188aa2244975f0e63228daa004a7102ebcc959e98
SHA256ea7b698cabf1ba4a613f7a3cf57d6266820034a0a3434f09595a2d1807def9e4
SHA5123a9baff8d1f70082b7cd3d028ebc93ae815c22832a0f423f03737eb04f1579c178df87020df2dae0a7f8940c88c887aa482d99a978c1cdb897866cfb13d92ecd
-
Filesize
12KB
MD55aa7508d1d51408bf534a33c4fa8ef2e
SHA1aca2e3e759b49d708bd1dad838cd0c6e176e6b05
SHA2565d25e8c3c4dcd170337e1f994250cc41ea424c610cdf14e86df469b9596a7f85
SHA512f4bec961a25565a0420cdd07fa63d711033874e3115923a16c5c376d9dc7f7859b9b45ce726fd2b6c88120e2017075612f4de857c2a7c02ba6ba6926576959af
-
Filesize
12KB
MD55b953dabb1eae0386668e52ddd4fd9db
SHA1c32b36e71836f4fab6d1bf51d81c34b887a40b6c
SHA25636a71b6eafe5782b82dce989f31d61f6a657c0a4951189351cb63fdac36fd4f6
SHA512a459a83dfbca60c4e712e74a319bec3631209b3fa1e56f6b6393df2e93f559214472f29ed4488fb5ad105d6dbf44c1b8a9281b5b7572242bdd29c5fddc3300e2
-
Filesize
12KB
MD5e60d01909f0b3b17d9958ae3d7ff1b90
SHA134c186afcccfdd1d7d78a9a50d4f331acb138245
SHA256526ff44b744f5ee603d60e9e1606c9ffdab3e15acf3be3d57c967064f844a43c
SHA5121a3b4df78029d6b268d8f28624c89c696b09f79e9aa71be025f3a4d246e0945b43c217ed7571ed62f9407eb6cf2fc2f56a642ea579492c1167d64657a91a0eb6
-
Filesize
12KB
MD55421b227f060ae04bd42ad4c432a9667
SHA17b1ba554a5ffdce51c079a3a7c3a9c81c5c46740
SHA256ceec86b5bb253fa2e61ec963d7e997fcc7099b6cf58a4cf2b32bedfc2f160ce7
SHA512bc7b8c658400b96f11d6222f8cff7d38cadbcbe2ed2c5771eaba89acbb37d28b962f7e96c5f84afc6005a4c2543c4d7dc0738258003376ec4f25de5d85918bd1
-
Filesize
12KB
MD5740903be0ad321de255bd30d473b9d79
SHA1df0ea804f50ddb0875c6c78f345344c6b59efee5
SHA2563dd7934a6a0aa0698a7894c1addbdce8dc8c5195f4661cf1b62b31e274a91d35
SHA512b133b325d5a56617e59110585300ee9f814d557f43f41601bc1fe2e22e53ecbdde4d42b4e422fa1ab387af0d44e958e2120147d07026b45aff782cb1b9014ba3
-
Filesize
12KB
MD563444c667ef06dc2b075eb2c24928fb0
SHA17dfdac668015e9637211ad4dc09993a170f8d9a7
SHA256035000d82fec24e3210ec10436c92c333a32434d951c630c86aa4de5519abd54
SHA512e8cfb03aaf9d65075850c17c1560a7a9e6f98da0fa65602a30884123e9242062eef6d8cada62ead246e6a9a1892a15e5a0480fc27a21e116984f27e08596d6c4
-
Filesize
12KB
MD56b7f26204ba7eaa1863dd29df48cc7d9
SHA1a5c9b82aaf171018f00fbc57097780b6986d16f8
SHA2561d5c34483b0b357aaa316841b2ca249af6898af053902de8f91ba49b3ea3dcba
SHA5121cd5a52dd1bd4245c306b9531d8cb968ef4401c31d5f20ce941f199eccc17acac4b65cf1b44ea5bb7563368ff71e4dee989676e194c385a09ab3dd75b61270c5
-
Filesize
12KB
MD59b54a818f051df8b554218f8e0cd09f1
SHA10832c606994c6b432431e6650c29fcafffffc162
SHA256788755d10be0628df72b06b3abd5e01b6c93e2e8a05068c2111679bd22c4db5a
SHA512dcb34ba1dbb5cfa596b1f8b27e15dae89c745226a6eee3d40850f0cf9b825f2144e0bac71b1157ad9dc5066bcae07bb46e8ce24796598b9a29bcfaea7ceadb39
-
Filesize
9KB
MD5b0fff4e327a0c66b7e8eab3d778eb0ec
SHA1cf5f65c6c788b5bd10435dfd244f0e5511434c35
SHA256c408dfce11daacf64fd13161a04253f6bf56d9a3bd1765d48b995cca5eef400d
SHA512bd76c1365036b2349b27bbf1e5b4dea97bc3a6e01944ab42ca74f51d1cd412ec8c2ef6525cb0a3398dd2b1600cd3bd23674597012dff36cdb2569ded2d7ad47f
-
Filesize
10KB
MD5679309891adfcd0addba18b748c73862
SHA1dc411e93c9a63f1e25d0c78061bf82f3e7356db9
SHA25651add7f8a5cdb800fa401573dd544d53fdf6ca502bb603873e0aa2c02b08632d
SHA512486944dbf41224286a108558e912d0ec802955d8d8135f778c950a1734031a97c01183839e5d28b1a187b68e5109a73a156046bcef274887b58c200268709637
-
Filesize
11KB
MD5c08c102848ac0bc1e2dcf05456c9ccec
SHA11ada26bb55fb6866d07e394d9c4e13c10116f59c
SHA256095cfb80ad82821d9598760b0aad768730efeb6988fa1e28c2506b1d8d86d300
SHA5120a0866dbb027c528745403160ef2ac0bdf6f3107f20d8941fb135fd47a937f89f4e5d6e1b08e7d1faa4bf6134b582bbbd907de22b25837f352ccd4e68c6da173
-
Filesize
10KB
MD513a9c0478c026cb6934a2e0a227f577e
SHA1d3faf1a82a05951fc63bc29c8970cf9e1d2dad78
SHA2565a2b994bc291760cb17d1279d518992f70524b7beceb591c8911876cf0429651
SHA512d230900efa7bc81309f37c9e70e7bf62723e9be4b35844b5e90744270c71cd1285fab8b2cb9d512e5ac7ab24239f63436bce6099956eabd3253e28e5ab4ca8f3
-
Filesize
10KB
MD56eb516e0ac0661a2fb5151fac4aff343
SHA13aef146bc44ea4794a1bd8cfcfaea66743d0bcd7
SHA256b20de0a32ee6536eef8c0fe010484cc274038a4e4e0e7ae65606e542ea32c1da
SHA512f898ac4ecd16d6a18288e89eb0cc9d24852a3e70bbb0a637d7053b745ba2a9a4b8ed8c9bb7dbe8856ff3dff10e0d4554d898956168db8248a484fc6cd05bda10
-
Filesize
12KB
MD53fa0b85809b603a923737baf5acf1c49
SHA1c01ce1685579c40c8b82f9e7f4ff9dd2b92886b7
SHA2562fbf85cd3a1416b0f7e0ed953536f73d3e10dbf0e202e8109b9d0a3e21128d1b
SHA512ab00d0945b0592af401a587b87d217864f31a482ba5f4e9158e65d55fe5784dbb42938fb3b3e7f81fe3e07fae29b5f944a2c86e02c0cd5e320c9d9a95dc3509c
-
Filesize
10KB
MD5e693c03cf14a4ef97472b5f3c5b0b1c4
SHA1378f7dd1d34ac7eabbd0633c080121ef26579c4c
SHA256a69ed8ccb152e8fa912c70c94f3559b2587996ffc38a207c7bca5f866a96f6b6
SHA512d137137434302ed654e95e4dca31262893dee04da7121f5c434ded865fbaa406227a9ee1f9f9194568ab18f730526ccfc888840f0469d69f376808d2871356db
-
Filesize
118KB
MD5efdde0ee321bc8e84ea900b7f1dbdc1f
SHA1f13db8678ea293cc53b552baf2f4d63ba1ae454c
SHA2565f11c281d85e8c3b63d9b298e0177a99a461865aaad8ede439e3455e97a78426
SHA512a7ba647f4e84cfbfffcccc550e9b7e1e34124f0cecafcad21fce44fc8e2eaf24b9b171cd4b7db57e0b902d0c379da7855b71a4088a9c2b7e9b5683e0107d7652
-
Filesize
118KB
MD5ba1e178004619ec8e22e05846ea7b96c
SHA1a82b2f4031612edb1da20fa9bf9e75863ce76549
SHA256280a0d527d44e8ca812675980ca3f9508a4ea81feb9ec122c9f0e039126411fd
SHA512d13d53f8dd90540791fe2127e2d06a0b46fcd28170573633e96dfc2f5210bb33d4c19fc41c6d26794da69285ab2b42389bc060ce28ab26a1e692eeaa016dce00
-
Filesize
118KB
MD54b50424ac08cfaecac5dd6ffdd4788c5
SHA1998666a6f8ad2294ac8afb40e980774a84057ee4
SHA256dcb7d454ff6e648cc94f9416c0a188524160bd1daccd2e690ce702346db6bb78
SHA512475a9cd7ea21afc8cfcb4f5af98460bead2e726812f2f1d5e98d81de5ca767de3dda7cb552e4aa60120c8843cb57da0267cadff1b639447f42ef9828730dc609
-
Filesize
118KB
MD51bc39e9bcb7b1da46071152e683eeaff
SHA166b386e3916888a7426dcddfb1ba742cd71fabf9
SHA2566d8963f30f44f7ef13d85d4711ddf886bafc798188bec376be40be795379c252
SHA512c01cdd1aba1a78e1f70a24768db6249ebcbdee0958001082c159945b0c9c3e4e696f9b0d2cf29676391c886e2b32fd16ca229d659c3c9f1838d6fca5b74af223
-
Filesize
118KB
MD54f817fbdee3071189bcabea5bc3f784c
SHA11a49763bc488bf21b7ba181b09eca5c4b380956d
SHA2561cb368678d26bc908634143dc83de0bcc40a637714159035324ec1ccac3356a1
SHA512a30c7fe0ca78803d98f2e859e700a5d4e93d0b80fe96537a6a2a0846945f83e3c7a89b562f57a64b61f76ad166f79de5e8a9e4193504f4c1437ff75e4f7aec43
-
Filesize
118KB
MD568f7ff44cdb54faebf0aef2d9d613837
SHA1d1f7989db62cb3140b210a413c790bd97d1f2242
SHA2563ff031db8d0d02eae8fe21722d0f210c7a0a35dead90de51f0aace1ddb83a5a1
SHA51271e7a0af2cc8a7cc1a7bd7c5dc0e8bac5b90e819e57961ca99ea70262b7a49b9cdadbf6bf408e08534d883c9fc775c3ccc507ffa7c2c7f08b784ecea173e7a70
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5l9wod5l.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5c9aed732ee0f71bf2e01b247c402676d
SHA1181a9c15a72b8bc29912065478bd60645d391109
SHA256c7b230d827af133460fb92997ebd160c1649e652dc29065c66510bd45c39b2a3
SHA51200c88abc02884670689bc816a827c659bbfd4b220f2aa821d03e17cf0b06653b4c6cf9573ecb3d8fd8d88a782d97cbb8b9ffe2b9151f6c2d0b33b0874e77f5fb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5l9wod5l.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize9KB
MD519a39aa96221c50b7bd060bedfd303c7
SHA1e4088152f466cb66d213faa412572257dc0cccd0
SHA256121d53dfd225f45606e37767741cdaeaf90ccd358538a109b83e88e8afb638b4
SHA51224dd64462cc890cb2e2fa865bd3c60d5bb4da79b911295c54fac9601d4e4337da0355fb552f752d0ecc85aec7e672cbb278e39a8a8899cbcae06357498c5e6b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize7KB
MD5f525c54030157e256eea0f5ea9343706
SHA1f226ae74cdfdd4e3874b2dea636d949fd23db8d9
SHA2565dfb3eb6fc13bed73a7c139217df8672b7a83393747340132fcb6c1682f09dbc
SHA5126cbe98847ff444011273f34cf0168029dd923293d8daa0d1af68fdf9f071d2604949140c505949c93a9050aa94ee32964004217d1e3026b2c2f324dbe482c695
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize9KB
MD5d85da6442d56da9415b58b171e3ed670
SHA1e09328fb6c3b03b7d2c2cc9d1190c45b0b975a7e
SHA256219974c9a832b99602ee81572d5e240c6b95b037edc9fa5acca78ee10a74ddf6
SHA51213d0eda08483976399767c89e5314e08f0a12b927ffe6691c9b3e27070a5b253a5818cbae4fce9f4e4cb42d70f6b4682b5499abab3e630540df8636b3db41ff9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\AlternateServices.bin
Filesize6KB
MD529310309eb7252c8634dbd35abe8ded8
SHA1c56f21f7de0ebc292f92089a443a8c5c086ec585
SHA25604468569d1391d054b37910e4e920f5a4e403dc27a14d8f9de22ff1899457249
SHA512c620d6192c667c628b0e93eb7a5adfe66c8a0b1f3d950fdf79bcb0e1550ae938e059e8f0f7858e2e65be7e34ca53801122cc1e2a8e32bd0d2cfec124f90ed63d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\AlternateServices.bin
Filesize8KB
MD5231f9b09c662785a94d80edba52fcc75
SHA1839f5cedf799e079f3fbfe338eba7292b2f97898
SHA2560ccc3f444732febc609b21a46b4c3e68f2bf25f482a9397607d937bd3f238d28
SHA51217ee49d59d35f90d9e7eb4f80639bf32a22b4fca079c861558590962c04222308b4eb3c612de47607a3eee30fdd378d02715508278f549ef6193698a95d67ede
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD559d59ab78ba10e500b085aadcb13dbd9
SHA111efed83aab4bd6ba9a762a7b957a7cd8d094293
SHA256222c3bee1a96c4dbaf087bb2038d56db34ff034720cf3cc70181d6d24591e422
SHA51214ea4e5e27e9f7e1043c7dd76761ecbf23c3a43a446384cbe765a7a90df1d95a328373a25fef9ff4c2fe3b9e24189554ff4c72c23e5904a71adf47f6cbe3b743
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD540d463551a141e53296e96ffb4307624
SHA1cadf95b1ceb2d8208786806b054d01c26f5909a5
SHA256a97880067efd8d6c46c10ced51d650f361a658f7afff9dd31c5a2884257d9838
SHA5124566cc218747a742647de995cd9cce401b3941f2277dc83ed73c909010e2a15fb11168c4ebd8db7b9f60072896bf96f244468c97d1b6bd0c8fc6c577f8234bce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\pending_pings\02effa49-9a6d-4468-8e3e-42fad3c3b8e2
Filesize671B
MD5c45493149b2ded9fb084750a2cfbc620
SHA111caafee050a70d4eb81a2b15a8b1c8e58723f57
SHA256ddeb74613756c1dd16998593c6feb1817b8ed37dde769ca662b59f029fa1c21f
SHA51247653135a26763cda9f5affb4bc869f82fdc0b236e8cbd5a3d297d5f4fcab3078ebe623918ddfad3ef783d9404955eef879449c519d67491f9ee2ada122b72ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\pending_pings\abf2b8fd-029a-451a-a3b6-1a3e79908c55
Filesize26KB
MD5567fa219d5377f9445e42e85b9c19c5f
SHA162f91bc4723a96deeeda59411257317d235c0e26
SHA25664beb3ba456b8831250b3786d6a6d5d6e6dfe478b8f5e22e511f0cc2a6ed5fe9
SHA512bca41b4246f738e5b03839f718cb76c54799e07d255eaaac605f211756c4e9e4b31d83806cdfab6b352a05a6f49abf987f3af50b0468e7edd9051f95afb452fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\datareporting\glean\pending_pings\ae46ffab-26ce-48c5-a700-574916d8e0de
Filesize982B
MD5c935bc40b19a8c2bd42717d0c7f79d3f
SHA1da283e9141619e4c148bf15721f21321ae0697bc
SHA256954338b66d36e69d5a411315dfbe36d4b7ee1a87f841e92c8fd553301c85385a
SHA5127100374f6cdcda6ecc3e3776ebba4a85fab0707f3e53b00c3cfe3af28c92ffbfe3b3d58cd6831fd71e940989b7ad19d82f5f8da29128859f70a8764ab43728d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5daf8c271093dd20d1b50a91bfe41234e
SHA17e0eba79a480509c94ad9aa45fff779d104a4d05
SHA2566f1f71beb11da09e98e0e313343793e191736618aa97128df672cde089109d3c
SHA5127e318ebbd462ee5fac4a8bcf9a2f5dc83c0d2c2230de4a6fc0ba4dce8cf2e2017b98bbe0a48f32ac8bcb00a25117df7113d573c13d313365843f7fec98482285
-
Filesize
10KB
MD549f3c0e1e8f581ae45534d7187748def
SHA1838e3dbe9938fceaa2a10f1ff5ae72e587ece14e
SHA256c9be3471aa5059802cad546a1e483a325800c85f8193c3a17070f43cbb4a684c
SHA51244a8eba99f6cfecca6dc3524c4b82870279c75ae3bd033d4643b1785f5ef882318f8c4ba32a68e095bb7f1077bafbb8d98e42768e755342fe04fa08b87478595
-
Filesize
10KB
MD56601d6f0e05ddc2eacd4e21ddf4a7617
SHA144807d8bb5600548a145ba69ac396fd570152b8d
SHA256462ade2e91adb01b0ebe879336061bc31dea77cd7325b79a8c45b8c7f860c915
SHA5121a2f54badbf335f7a772c6a04f6852ac6360eea9809ddd556d445993f497844e037e7655f43b1257d8d8dab4e53400abcbc6e53edf15a993512ebfc723c0a7d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5cea6fadad6ce39645ddb2aa5f73da37c
SHA1809de54c7d09091312e5f8a744b198c678ac394d
SHA256c6d57314336fb1c826eed6efed3aeb7dc0c53c2baaec468b01a9c99bbce7208a
SHA512d62b7923b25d217891fa5e6e06e70eb4dae110456e9ffe49e0bfb601bb25052e529f6b20a6d773a08044dc175c559ae66a2cd3f57fb27a950a13d44723b23c65
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5l9wod5l.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize384KB
MD5733dbad751fadbd4ecbc87e30e5ad76a
SHA1c5333a43ecd13e8f4b4fb99a9f794b866f9ff465
SHA256985bb8c3b99898efb580e76cf7031c8b867e02ab37226a40701d37bf26c5f021
SHA512617ebba78451ee0361b908cde517445fb7e3bf89c4125b075aae003b261aab8dbb73445064f146a0df3c31262ae68857d0191406d197c1e331badb50144ba23c
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98