Resubmissions
24-01-2025 18:53
250124-xjqd7atrcr 824-01-2025 18:37
250124-w9e6gasjcv 824-01-2025 18:35
250124-w8hvzatlbm 324-01-2025 18:21
250124-wzj2ns1nbs 724-01-2025 18:11
250124-wsl8fs1kex 824-01-2025 18:05
250124-wpbmjsslgl 724-01-2025 17:27
250124-v1e9fa1kbr 8Analysis
-
max time kernel
68s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 18:05
Static task
static1
Behavioral task
behavioral1
Sample
Xeno-v1.1.35-x64.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.35-x64.zip
Resource
win10v2004-20241007-en
General
-
Target
Xeno-v1.1.35-x64.zip
-
Size
4.5MB
-
MD5
5f7548663f208cb2fdd2350b916719a4
-
SHA1
689f5e7275b316892c88438d3bcb1ed2bf643697
-
SHA256
69e43fe7ea3817134874b2da967ff6d590b0513e125580179c0410df9cfef39f
-
SHA512
4ea59a095cdb5ddc1aba1a4a46b717799012cafdeca795e84bee6c5f5892300c82e7199d1e3f70503d87f6fa4e8382137d0ffb738776785fc2e71d2037a4b961
-
SSDEEP
98304:OmD6OMyjrm+twdjTmDh/BRFQNM74slPUDtgoCrEhxGMZLvrylQQOJgq:JDUyP9tWjTml/3bZUpn7GMZbOe7Jgq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2660 Xeno.exe -
Loads dropped DLL 29 IoCs
pid Process 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 2660 Xeno.exe 2660 Xeno.exe 2660 Xeno.exe 2660 Xeno.exe 2660 Xeno.exe 2660 Xeno.exe 2660 Xeno.exe 1152 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 2416 iexplore.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EFBAF01-DA7E-11EF-BFE2-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0dc18f98a6edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff0d000000ff0000009304000064030000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fde1010875cd384aa76349b1690934da00000000020000000000106600000001000020000000c18e8ad9262ef7d76a7a6b36ae56e079d9e91dd484f4ba913926c327e6187b8c000000000e80000000020000200000007a1ee8b1621e16200bfe18ed0f2106233b5814959087a5ee983900237c48b15e20000000d5ecbe082750c19a27acdbe8a70adf55222ea22b6cc7d936135eda9427b76363400000004d8c50fd492fdb9506467771b1e1e2edbb043048675fcc57033288f2cbf56fe60a9a0a9f4267753d92f7424f95a7be981da0f7eb2ab28d7f877da20de0949a40 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2632 chrome.exe 2632 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2700 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2700 7zFM.exe Token: 35 2700 7zFM.exe Token: SeSecurityPrivilege 2700 7zFM.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2700 7zFM.exe 2700 7zFM.exe 2416 iexplore.exe 2416 iexplore.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2416 2660 Xeno.exe 32 PID 2660 wrote to memory of 2416 2660 Xeno.exe 32 PID 2660 wrote to memory of 2416 2660 Xeno.exe 32 PID 2416 wrote to memory of 2400 2416 iexplore.exe 33 PID 2416 wrote to memory of 2400 2416 iexplore.exe 33 PID 2416 wrote to memory of 2400 2416 iexplore.exe 33 PID 2416 wrote to memory of 2400 2416 iexplore.exe 33 PID 2632 wrote to memory of 1692 2632 chrome.exe 36 PID 2632 wrote to memory of 1692 2632 chrome.exe 36 PID 2632 wrote to memory of 1692 2632 chrome.exe 36 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2700 2632 chrome.exe 38 PID 2632 wrote to memory of 2140 2632 chrome.exe 39 PID 2632 wrote to memory of 2140 2632 chrome.exe 39 PID 2632 wrote to memory of 2140 2632 chrome.exe 39 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40 PID 2632 wrote to memory of 2004 2632 chrome.exe 40
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.35-x64.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2700
-
C:\Users\Admin\Desktop\Xeno-v1.1.35-x64\Xeno.exe"C:\Users\Admin\Desktop\Xeno-v1.1.35-x64\Xeno.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win7&apphost_version=8.0.11&gui=true2⤵
- System Time Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:537610 /prefetch:23⤵PID:1328
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6949758,0x7fef6949768,0x7fef69497782⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:22⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1428 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1460 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:82⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2072 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2080 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:12⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1664 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:22⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1952 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3468 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3464 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3448 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:12⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3892 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2200 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 --field-trial-handle=1288,i,16070926449170241142,2831208399098843275,131072 /prefetch:82⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:912
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:2968
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:944
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="944.0.1658190426\682193374" -parentBuildID 20221007134813 -prefsHandle 1208 -prefMapHandle 1200 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6a0b772-68bf-436d-a8d7-298fa32c85e0} 944 "\\.\pipe\gecko-crash-server-pipe.944" 1272 111f8958 gpu3⤵PID:1940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="944.1.123641178\2015513538" -parentBuildID 20221007134813 -prefsHandle 1464 -prefMapHandle 1460 -prefsLen 20928 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a06f809c-add3-4c26-b72c-b899360f2a00} 944 "\\.\pipe\gecko-crash-server-pipe.944" 1476 e71f58 socket3⤵PID:1276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="944.2.332964865\144638139" -childID 1 -isForBrowser -prefsHandle 1992 -prefMapHandle 1988 -prefsLen 21031 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {49ecad8a-2f18-4274-9d99-0d8ac31aa2b4} 944 "\\.\pipe\gecko-crash-server-pipe.944" 2092 1a58c058 tab3⤵PID:2468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="944.3.349643197\1890274806" -childID 2 -isForBrowser -prefsHandle 1636 -prefMapHandle 1632 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {32e1916a-5283-458b-a046-378302c3697b} 944 "\\.\pipe\gecko-crash-server-pipe.944" 2324 e67858 tab3⤵PID:1764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="944.4.482142258\861408972" -childID 3 -isForBrowser -prefsHandle 2844 -prefMapHandle 2080 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d136e7b8-702b-4db1-ba82-408afe60407e} 944 "\\.\pipe\gecko-crash-server-pipe.944" 2988 e62b58 tab3⤵PID:2604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="944.5.1933199755\1219375470" -childID 4 -isForBrowser -prefsHandle 3720 -prefMapHandle 1064 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {497a4a01-4fe2-45c5-aa77-4d4b4c2d92ea} 944 "\\.\pipe\gecko-crash-server-pipe.944" 3760 1d78d958 tab3⤵PID:1792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="944.6.1481254599\1606391376" -childID 5 -isForBrowser -prefsHandle 3872 -prefMapHandle 3876 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ff83b6f-41c4-428e-8ca7-b092757391ed} 944 "\\.\pipe\gecko-crash-server-pipe.944" 3864 1e855c58 tab3⤵PID:896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="944.7.1859540731\1818934352" -childID 6 -isForBrowser -prefsHandle 4008 -prefMapHandle 4012 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e3ad5d3-0872-4d78-b70e-9339a0424c86} 944 "\\.\pipe\gecko-crash-server-pipe.944" 4000 1e856858 tab3⤵PID:2748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="944.8.2049327861\1693101023" -childID 7 -isForBrowser -prefsHandle 4228 -prefMapHandle 4276 -prefsLen 26450 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5faee25f-866a-48a4-82d5-87ea3e432179} 944 "\\.\pipe\gecko-crash-server-pipe.944" 4296 22134358 tab3⤵PID:1452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c22397fea0d899254bc87e87b60d7dd6
SHA14f6801da00b3c0f86c5c57a5069eea85cc9a3563
SHA25614a38f8d76b12c1dd9ad92aceaa90fa3f8e71bdb65a36fb0ee1b0b7ebc428264
SHA512b666b9bca3cc20e97e9beb4032ebc1fad9e64aa15c59cb92df67f28fb14b069af50d0cd67406155d18311dc0d5dd6be4bbc0616c47a334d904e749ac2ad333c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7de954fa788e5f52b938f5d7ffcdfc6
SHA12c4156a3ce2b21b6c867d34c391da1032110a0fa
SHA2564352379764033caefabdf0953adf60456c7df86f9263a1bc0b35220ef8234112
SHA512b6633f06efaebb8172eec373513a820a5e013b28b8b9ba3cd87e6e10c4f021bd75f896ab100bd068734b49cecf0a218f211a02504853a46c187d6b51786ca475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dcce153aa7fec9a80134cf9ade75f16
SHA155eadafa89010558e6091f6af98eee2c8c71983b
SHA256aac89fc7fbf97146c606f1c3362250f4e154bf76708622802a048e4b49c29fe1
SHA512af88c03604ef25882e2499c5eb36a02b0d6f1198205835562b27a984909ed5bb0570e11849d3c1e541589891299dff8b3b4d61d737b9ee97666c242f18da504e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593760e2a57c5ff11e438235536a9dda5
SHA1b37525f877fff04e815c4b70afd67100d98f69a3
SHA256c403c86ff4f9b5616af67489328a8ed1118a951e6ea7368bb9ca7902d4f56a8b
SHA5121d399fc685d2a0c02091c148818e3b07c49abf00599a40feab48b5f1cffd3eb4ecea6577c7fcf37c531323de40143bd58e4f7ec5c349c1b3f1f49a453c01162a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab0ea79b01b8273eac234c26e26f46d
SHA1bcd713d6e94efcd8dab0570eafe45fb047be1415
SHA256a3ea2aa93f937ec8ea334328fe49178227727bb3498a62ae8b247ac1813ec8db
SHA512e08ced46046e5b60e5bc31c682a73f975f223007abf6187663a987f1b73b825c60f404c7b64a53739cada2339c2d17fd60dcd35fa0a700f6eac28ab8e5cebdb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6f8f322454985f7aac8976a54977e3
SHA1dd244fee6bedc4a13ea37c8a4e4c53ddd5f9c4fe
SHA2560ebefaaa4c24237c6913d76f67e58be08e8df7b0dfb2a3dbb3681502bf06726f
SHA51255c39cc71f70bb0a3eb0718ffe2e0fa22d43f78aac02c7e7e15d2637a8966b5328f27709c60e11706f00e7947f2275730519d1a409ffe1b73d769fb8a76d334e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57352a4dd0ffbec70e1925cf701629301
SHA1e5921961bc3284be3c3a89b1f4165fd2023aa559
SHA2560593c91544c6f5b1540237fd540efc60b0dd77b2ca4e78624ace587db254ca7c
SHA512852e6a61cf5fa27e14cb67295cd8cdd2554a19c9f365f019fa9fd42671104d3cec4e9dfa76749814df4f3376cc9dba7135c2824b516d6015cdcd16d0aef2e155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840c757ed138a520906ace12a6fa9221
SHA16f1789053a40a373812b9ddbe7531df11e601260
SHA25623f7a6ff2fb55cc29ea6e22722f17dad7cc371ef63d34e05ca55b07af561024e
SHA512c2bcd586bf10d26194979ede39904b1d4face8c564e8d71495daf8db49f759872ba5ccf99f2c6e2a02f38f3c4aacb1dccfa31e0192a06f80413bb6849463a51e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce49c795e3ad075b8264d4d5f7f13473
SHA1395d5acad1b09c15d77730731f1a8525d5a782ac
SHA2566d73f9a49f89c7d0cbef9ae2705b26299e3a399cc6c5f63e6520312b5a9bfcab
SHA51240ba9c8f12ed545241e4dc73e26d8335dd5dc396f0d9b9fbd7f33796578c5b50a75625a66296aa62842c1754c99e302b695ae8d80990e3a42b2bb3ce5993aa16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a548e1e2d7a6676f704b5f3be26f3b5d
SHA1b15f6330866908458a29041c173abdedc340c7da
SHA256ac7359a02378ead9642769e1e4115a20f7fbe5e3e695992b6dfc966a5c10dc91
SHA5123cd913f2ceb6a771a1875b3583b5c608e1b3bc110dfadec9ef631e65caf1a141ff77b619d03bd99aec3c3acb41e3343f9785a43a6741bd4765878135f83b73fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57640b0c814507ce8e6587d41c65d3ab2
SHA19ff9b9207925b06fb362d14fbf89aba38558e14e
SHA2566a1a9d201edb5cf276c23f00cce20987c514e810106a8620a74321ed385b9c35
SHA512a12759eb6c683185344d3f209ced2df22d81baa34557bdbbd899aa257fc01c9bbe2acb4cf5a713f07cb10f19a15560733e24fcac5bd80d68638888835367b91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e08098af11d4c2316a422ad31cc633
SHA11fae7f9659ed8b220b658bb35a62e51b8d8d50b5
SHA256bdb54a31f1777796bca434cdc7dad867b38edde931af5f4ec5cbe45494b5a71a
SHA51269118dd4c3e51edad15eb4d0a1a857bd8d631a5c165c372ca1f9a9f1b2427ce05cec6564006ed3ad2d4132412f1a803d05320098715e9d2c4800372ac2309128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e2dcef3befabd97c0e9e2033d60fc8f
SHA100d9e3f2432a310f621214a681b69e22458ccf23
SHA25616473956b173fa2ecf932cef95101e401f0063a7a15a5550a21b6c97f039aff0
SHA5120b5bbeca424da2c79ed1b3c75371bb2a54c795141df60041837847114b5b5e0791bacef19cd311da2b2dd17fcf224a119d83065816cbce9e532db9c2e813863f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c85e45889ccc31e31b64fc20f8a807
SHA15e7b88c9fa14afa1684c2c01a81a845e04bba789
SHA25611d42cc9d31dea3e8506875802b7bc7b2fb0e755912cde7ec141fd4ea8fe59e1
SHA5125456925d60931013098abb3a87543f6e050b070620c3b4884e698ed9a537d21a3afe596e1d527c13c2cc2d3ec414347630d9eb1c845f6b55de807240c80f5589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0fec2b4afa42cca2bda10b65607b20f
SHA16d0a7d3a0d69ea50f141f420efb78e0b527d6852
SHA2564d34c2a9d4d4679daecbffa67650a2ed9a4f93b7340520d43f8b4371b7871173
SHA512b1735df9a58d4622fa58ce7575880ef97b2f43386a65f66c0f567c4448af33de43773d04b895b02415ed9892adfb78d95ec6c8c8a2cb5ff4cd4a173ae7d825a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc509dfe51cc79a6c912d3b70e3c0b00
SHA1fac435a01dba966d1ad8e7743b7823d0e43c3bff
SHA256f330aa7a6c3d8f4123c6702987f5c7fa8e121d52f4360c4b118dc7d0fc3f0261
SHA5127f622d8a4c7ef538bb08446584f9d77ca1f50cc184ee02da1c5e44f64a254990ac8bcb5c61524518555b87c3aaf3f3727f1e532801d2b14445c5549ff7941e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49fb9e909f05a329fd2361786f3ae68
SHA14e8873888f69c631ce549fc789fbda7da78e4bc9
SHA256e771a9c6c6053645773005adc7f40f7995dc7fce457b0838049da836e626dd04
SHA512ba6cfaedfdeff83e8891ec69f8213227981a513bc11389a91c9429c6f417b2430edd1f027ddc0c881b8654e2b8bf4bff200a84a70adeefa1f448f6712291ee53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d355115b821ea5993f15b4fd181542
SHA175377139371922e648c3d38508db4ae82785949b
SHA256334ed1efe18a251f28e721b74c518622ee9b20b184eb338df31c1e0eaa8e84b4
SHA51235371b19d2700a830c2931f1316b82a654c6a38de5643f2484144bff3e75cc162182c0d8dd71277c96ee465c98bb436eeeeec633f738bc29aaa6b18326e358a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55412fad1d7c2f5fd6b12a2076b86964a
SHA1bf674e91f9a3f3d1e94d214ab3f61b93cd37c68c
SHA256f98f62a5cc261fe2118c6551e5ab5d1f43bf122a9c48f25e02db107e6c6d194f
SHA5123e1fc15d448f6187747a8ab0c5ca86c2b4cb576c0856e7062674c033f4edd517d2a95ef8a6399bca3b8e9f87d54d16dc86c12f71395ac5afb49aa0e7b31b4456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad92850b4258c26beebe2e85236e62ec
SHA18b3e60ef9039c3b03c35d71778979eaa29bfdee1
SHA25663b72d1baafc537c118d232c57a28d0577ca4d0acfd1271c4ed01c8e9d5616b4
SHA5124222987c64018975427f8aaae6660c8456c2b7bcea4cd504522cc77bf166408f7962e64b2adea50f1e27a9220c3646f95baf4351ab6585a84ee0d19dcac3f151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554cb558e0d73ab5fa3694f8000484e74
SHA12e5b6efb3ccbfb9fb3820b046e45848c89ff4894
SHA256d68266007a3fc593c29029a063def40153806427df40f3adcc49627239060d32
SHA512f7c62ac9afc07f28c725b4910a00ef9de41b71f562ba7031abe7ecad1c13bf5caa51d4c2ec4f3828a314987ab78ab1cb4248df6e46f34a26d9fa3c34dad4b23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53764c29858a038f5417957487f029cc0
SHA17bd57decd952c06279389234b771377a0557a010
SHA25683b533a383c594213b79f0155eca14320f655155e14b2288ae1fe0bb68e4a736
SHA512c204279e7512235ee34fe590953910e22aac761392c44fcfc43ddafef1abc418d2cf319ac369190559711b114a57c836d1e371104f2af9c1d7950f5fef795999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1958f770498e0c5a4ef8d8f138b9b8
SHA1164ee35bc3e0d7046a8e12ef92501e4b0b18397f
SHA2567f10fd9a2491df168f7fbb1dfc8df47a212ed1f891387d25c11d6dfdecb3da1b
SHA512e4e8acecc8a25cb18c1566acc75baa3e29321bdd0e1a043c467d8c18ecf67c3aea0ed5c2f68cb910cb8c9d2598fe7ffb6cc13ac430b53f82b82191bf264d4c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5131ecb9d9cecf814858190e05e9a07ef
SHA13842ec3eb9858b4d63717726815df3a31c3bdc34
SHA256ed553a22ce7c1d9309fc958373638158ba4e07e9d86655dd383cf17ee1eaede2
SHA512dd49bfc305cb0adc9433af23d79fa84fbcb43f50c1b666455ada9e46eafb9daf81830ed384ae63dfc64afb97f80761fe8e34a68fd0a484b1682cf7964bcd180c
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5786c8923cbf5cea5f98498543cda6b4d
SHA1c84bb553bae1d9cd2e992cd6bb7570692852ce33
SHA2569718a2d2da24bd486cbce2ba3deb87466fe3b3af8ac024639dccca24c9bff42f
SHA5123f32fa20a92e26c8aba45563b2c0c5cc93eb360c2b21a5edd9c82ececf171fe248fa6e54e8490c0367d91a5aa52953fdbe4456c9486090460e3a1b6c3607c210
-
Filesize
6KB
MD5469bed6aea94417742bb6c32dc77b1b4
SHA1ae8e6e469922129deb72a7c53b8214aa8d29cecc
SHA2560ee193efaa48083213318eeb37818eb6304ae37c93d6ccd83ee664d18ee1050a
SHA51227945944752c6677ae0f92a20c220cac3698fb3b1d314b1e2fc1db2bf0a8babd4a82ee7ba7fcabdcf2e50531a52b397e915748ade1e1a8b20ac88a67bc61575a
-
Filesize
6KB
MD544bea4eb1096e84d0ee64f58d64df45f
SHA18bcd983eb9f92fe0ee5eea8cca007675b7aadb5a
SHA256082e07a3fc2273304381c3a0b2bfd9d4788750223d519714f1bda4829cc6ab58
SHA512451988e72a0391969cd1b5141923042c1fb9fd64b6d0796362dd2fb6173fefbb9884dad01f70c7011fcde7eec9fee03c0d157639ef129def810a6538dcc80e6d
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
347KB
MD5f22edccbb8aa92afe57e95a69a32f092
SHA102bc931497de496291ffd7ce377fdab7fd15ede4
SHA256735c7a8d565d22522872c257d155f550eb02ad5302e72b99f5b14bc188fcbeb9
SHA512f788bd1dc7d5f4a9c2b1df8e16ba72889c441070c06cacb397eb77d8b1b059631454ac45d3243d0c4c7151bd292b39d3c3656e62340557e16c4cc37a591245e6
-
Filesize
347KB
MD5612aeffa1c1ff95eaee7740d3d903055
SHA1f532862a089ae248ca66f63278c8e470aebff6da
SHA25695983c9fa565a8d74a3226f5260136fe00630ebb436d6af24497f698569e50eb
SHA5120d35b18f8b8c395ff68555cd1ab79e4cf305f964d1d147c43b4b0145453ef1423de8ba7c9fd733a1764f13ee88f90f4994831e493d8309fd53392aea4a96815f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD56eaf57e01f7b5c1d28755d18c4aa392f
SHA11d665631fa2a230e2c139e85c2ce9efa39848f4f
SHA2566102b2c3d19ebafff1a86bf2d361b15974c5c90f716d42f6c0dd182911f6f03a
SHA51263378b70a5556f01f40fe130253ea80788efffc33bd623f51aa86c18fa4fdc5da2fa3df614f02bbeefe5be15b242c23ccdc2304a5c43ecaeadbf6e4cacb3c023
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD53328578baee19f6108ea337daf4daef1
SHA13a038652e414f63ef945b06f0e36b5ef8f733023
SHA256a4b35ad814488eb8613e901d6c5897353cb13dc5bf9db24817b6bab3804dd17a
SHA51291d7af48688554a2670216e02ea6ac49ae1fc1a2ba9514d9eb78854e16b0c65cdabc87462dc6ef368de4396882db68fedcb8405ca29e69ae23ccd017d484fcb0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\1d0236e3-4c98-40e8-abce-87172c5b78c9
Filesize745B
MD5db82c91fcba0fe0773529a0d16034672
SHA151b5a20760d233ad5c653c3baeaa58f853062987
SHA256e3af13318d3d5202fef992f72aa0933c0ad37e090a75bfae6f135b6432b844f7
SHA5129eed8b3b2b18473af6e1f750f1ec7925a9eda7a9a218287cef70d7b6c3696c7324169bd9a43fe0c5e5f2101e2ab6faa2f99ea93f6d0b46749ab6ad8e82f512e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\acfaeda1-be7d-485c-82b0-db6b44a8b8e1
Filesize12KB
MD5152404eb07b30b53f2ad1b09483b4050
SHA147bcf5ab0e99d4d063714545a91a3ce3e6f78320
SHA25679122bdfebee6b6673ac4837c79a6fb4562b1fbb7f1ad5f7940aae1a5039e4c0
SHA512111a9eb65763b1454c7e70f5f3961bc8e906b41149f84c96d331d70f733594d1667210236c28769424e54258ab8a9dd51bb6722cc65e4c844732c836c3cd71df
-
Filesize
6KB
MD548272f06cb7aa4cb9f03d6aff795512f
SHA1d58e4ad333c876955793194c28f39e7cf785943c
SHA256f9fb1b998e17d45754a5b1c0287fc13ca471c1f09d42ecdc680ab69e979a3ae5
SHA5120fe77818e85cb7f3f2f5c032e2ccd11814bf3ac6c71e4fc6b9c436310e8b95ec1e77d7a58911d28f18b43c7d304b5499acdb084ea3d456b64e450a77ed452810
-
Filesize
6KB
MD5536b4f1998e769bf6de27dd1e9b559e0
SHA1ce2cf8298896e9429e941af22cc523a5897e9f07
SHA25657fc908244ca334dab8b444ce44324f316f96b2dfcecf931674c7cac636a6916
SHA512109bb24e02f366c4d04c536adb84d37f5150c7ca04acb761d6acb2f178c036cff2da71d9187b4ed99b7f61a5bbce446b731fea44bbc2072b60c6b91fe52ecf1f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD507d59984df3594c9bc6e2623d1462460
SHA1a84e25e2f6066cbb000d2db76e4b6c434063b67b
SHA256a46e3417791a9e207e9501a26ab8c61ed8e85107389c2a44edb69b5421318bef
SHA512a206de55a30fae20d858a123d97023cb78275c204325abea102452956048434078df5fceaf0b6567493a9e9383bed454e470728af6e9a48428f6b62cb0660340
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\sessionstore.jsonlz4
Filesize1KB
MD547bdce36c7ec17164558389d3804dd00
SHA1a732d38b13952a85425ab6e6a96810e7edae3cfa
SHA2565f32bb082da97a386e502098c72c434487fbe4d2454eb1aeec55c6aa4dcee78a
SHA512820d6d09ed9c15715236d32d87d6ea23ef456dbfba0f7f7ac1514e26300987b6a7a72bf47f26caecf7fd893a486b86faf35cf8f287b8083365353e74eacd7c25
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD54db4fd42bc85f29cb436e1dc487ba94a
SHA1d608291203a6807b62e2d30053e03434dd12f6be
SHA25687e160ab1b7a3ade8b2d71dfc2ab3481d3387cf8663f8db7f56ae44eb8bce8ae
SHA512d382a73d7f45abfff45820379a2eae2038dd82b23234ec84d331d44e9bcc319d1e47e7816c8bb19ea0e6044b6d9ea12d4e93bb275efcbfd93a1885e9f137884e
-
Filesize
17KB
MD5429c26ed27a026442f89c95ff16ce8c2
SHA169ed09faae00a980c296546c9b5e6a8d5f978439
SHA2562a466648affd3d51b944f563bb65046a3da91006a0d90fb2c0b123487a1fc1b3
SHA51204641164d9e1eb3183db0c406583626011dfe2b2574551c0ac466ebf44165afcd7d8faf356b8268b4fc9a54db20de010a4e4293594ad2e605950aea65636f4e5
-
Filesize
1.2MB
MD58363219b62cf490fea5571d5b779c174
SHA13d259f711d21053b7323a740e8c256ca77c64efd
SHA2569840c97b35afb77418d541ef2f1b5da93c0d7d9632c334ec7444ceadeb0f9fa8
SHA51270874a58bbcc263e1c929e479bde31e731cb26cec6a51081f3d33ae37be32b4c9e96a36306d997f12a81e0867bc13a0c32baf14c52b9f1dfab894decf7305a22
-
Filesize
140KB
MD5f0d6a8ef8299c5f15732a011d90b0be1
SHA15d2e6cc0bd4f1e810808f2a284f6c2a30b21edcf
SHA256326bae0bd1398234dcef4c3d71f00e30cc9b447fa963e21d6f29605f42bb7e5b
SHA5125b9f1517949a7fa9fdb7413146632d21a4208dc92823b673af85963ae5cc7f827b3ba27f3e9c5554c45e726ad159aac77d30306acc3559bd8712534e41ff0f27
-
Filesize
95KB
MD538246fb0d91772bb188b74956fcac653
SHA15b513501576bfd408c002bc7e3937222bd5880da
SHA2565467a08450f3330e5aecfcac90b7e2f6005b7031b2e900c6080e894ff435223a
SHA51266c2db8045386a2e3cf43cd56c9fc72d34108a4092fec0ef83c4817a6e2484ddde4d3366228532cbe60bff02d6e28b6c7354c749db955de236396dc29116251a
-
Filesize
15KB
MD5c8dbf0ca88facfe87899168a7f7db52c
SHA1e2cf163ad067b5d3b19908a71ed393711f66cd09
SHA25694b6e91b93c2202dabd659bff294bee87c22897a30a6b4930b49051c2fb502dc
SHA512e85c738f5d5a0ae6c3ef75a082712cb3cf2feae4560d316cb110e4eaf3a97d6058d5374da2a5edde39c3114f9aff8a027cbdff8cf49be2425943bac09c39e70b
-
Filesize
12KB
MD598da186fd7d7873c164a51c5d7b77f1a
SHA1725a8b8fdfbe6a1e85674f4b2a7c0dd08411e00b
SHA25680139e4caa379d87b1d1dafc23ace71d2b330368115f6314140d4ae59c2a78e8
SHA512587b49a24cc59d4dcb62b59f379d1c9010196a6551cfc99ffdd931eeb0172618f020863191e530d65ad198e57063c57ba6f70bcf80591304243268ea5513f806
-
Filesize
11KB
MD5ff48b107b2449a647c64baabd49408a1
SHA1efb868ba125d9ff08474f02b9483d74c36a13cee
SHA2567bb8644e565ad4bcfd890f9044bccb4d99953a740e9a500b1f820b2fdc3fc240
SHA5124da2e4b727e7f31f8bffd680453c451b444bdf217c15cb36e353f8bb5ecb6c6481caa7d848558c7d94cfc2d1bc3551ace11e85ffc8ec7a7b570a59c294ea0216
-
Filesize
20KB
MD5e10e077bb06209aedd0d0d378c758f73
SHA197a9053a311280678f8ef65dc4e25975c41bd4ee
SHA2568a7bff1c918539a75c25568db25933d653c003e016fd7791a37186b42bbb7c20
SHA512571c1fc4192320bd967b603e6cda917a62f4720eb4dcd557ec2913d2558c0cfe68f936198f5809934aaa3a1d6049e8e918eb0e638a7244df5c71ef0c78843191
-
Filesize
16KB
MD5f91e1ff896b5616919ac97c7095c513e
SHA14ec6eed0bac5a8801db10238c7b3a5d35a87be67
SHA25607382c0d91dad2bb6ba8bd06ea02f12c57abf7c4e5a70672e9f2954d09a4ffd4
SHA5126448d6cdfde11e1805b6d381111ea062f681807c9dc54ae890305f287b13b6fb57ef3f4d3b909e56b81c99830c086b5702b46ba0f93e695fce2b87b32fa4b26a
-
Filesize
18KB
MD50f593e50be4715aa8e1f6eb39434edd5
SHA11117709f577278717c34365ce879bcd7c956069b
SHA256bf4ea10be1b64c442ac0ccf4bdf69f6703467176a27e9e14a488d26448a6e179
SHA512487dcbf7b7f18d62606cb2f05c8feff07e6ecda42e643f5919c6edda66cdb3b8cc393b0d260374f06c10cf54082410fc9f02bd87cc50866bc0c28b0bcec3e658