Analysis
-
max time kernel
894s -
max time network
1041s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
29-01-2025 09:58
Static task
static1
Behavioral task
behavioral1
Sample
sample.js
Resource
win10ltsc2021-20250128-en
General
-
Target
sample.js
-
Size
53KB
-
MD5
0fe5d379ba13ffbe79071ee5050d433f
-
SHA1
9f6b75eeab43c7545106f7c34dcf451e1544cc32
-
SHA256
a77b46a19d7c96601d5baa05d9b0091f6eafa696b5871fdfe3d7c61aa9722b3a
-
SHA512
ade927d4f63d93abd0adc802f224e3d54072394312da0fff493bffe3c377931ca4473372582ee5e616b041612e0e27dd801777b9ec5036811b6283e62ddf71cc
-
SSDEEP
1536:q69UFuCHuZpMoKHQqWSkjp2EAcSgNRI6ZsnJVrQ5Ya0S6V/9hTl67Q4sclW+CSS/:V9UFuL3MoKHQqWSkjp2EAcSgNRI6Zsnz
Malware Config
Extracted
crimsonrat
185.136.161.124
Signatures
-
CrimsonRAT main payload 1 IoCs
resource yara_rule behavioral1/files/0x0034000000029703-5497.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Crimsonrat family
-
Modifies WinLogon for persistence 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" Blackkomet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe -
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse pafish64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService pafish64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF pafish64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo pafish64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest pafish64.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ pafish64.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ pafish64.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ pafish64.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions pafish64.exe -
Downloads MZ/PE file 4 IoCs
flow pid Process 585 3744 Process not Found 368 2852 firefox.exe 403 5612 Process not Found 474 2852 firefox.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\spoclsv.exe Gnil.exe File created C:\Windows\SysWOW64\drivers\spoclsv.exe Gnil.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools pafish64.exe -
Sets file to hidden 1 TTPs 64 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 10088 attrib.exe 5952 attrib.exe 1216 attrib.exe 10608 attrib.exe 9620 attrib.exe 5536 attrib.exe 7040 attrib.exe 4284 attrib.exe 4156 attrib.exe 6884 attrib.exe 6320 attrib.exe 6268 attrib.exe 7804 attrib.exe 8308 attrib.exe 9804 attrib.exe 31960 attrib.exe 2672 attrib.exe 9580 attrib.exe 6384 attrib.exe 3980 attrib.exe 9264 attrib.exe 6940 attrib.exe 10760 attrib.exe 4536 attrib.exe 4708 attrib.exe 1540 attrib.exe 3728 attrib.exe 6492 attrib.exe 7096 attrib.exe 6372 attrib.exe 8220 attrib.exe 4236 attrib.exe 5776 attrib.exe 3524 attrib.exe 7336 attrib.exe 8348 attrib.exe 10164 attrib.exe 7460 attrib.exe 8684 attrib.exe 10680 attrib.exe 6132 attrib.exe 8228 attrib.exe 8276 attrib.exe 11004 attrib.exe 7024 attrib.exe 8312 attrib.exe 9836 attrib.exe 5716 attrib.exe 4960 attrib.exe 7576 attrib.exe 8316 attrib.exe 9312 attrib.exe 8992 attrib.exe 5624 attrib.exe 29740 attrib.exe 4676 attrib.exe 7940 attrib.exe 8828 attrib.exe 8352 attrib.exe 7180 attrib.exe 10164 attrib.exe 8008 attrib.exe 472 attrib.exe 568 attrib.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion pafish64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion pafish64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate pafish64.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation winupdate.exe Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation winupdate.exe Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation winupdate.exe Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation winupdate.exe Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation winupdate.exe Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation winupdate.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 62 IoCs
pid Process 4408 RobloxPlayerInstaller.exe 344 MicrosoftEdgeWebview2Setup.exe 1308 MicrosoftEdgeUpdate.exe 5236 MicrosoftEdgeUpdate.exe 5268 MicrosoftEdgeUpdate.exe 5288 MicrosoftEdgeUpdateComRegisterShell64.exe 5316 MicrosoftEdgeUpdateComRegisterShell64.exe 5344 MicrosoftEdgeUpdateComRegisterShell64.exe 5384 MicrosoftEdgeUpdate.exe 5476 MicrosoftEdgeUpdate.exe 5508 MicrosoftEdgeUpdate.exe 5548 MicrosoftEdgeUpdate.exe 5788 MicrosoftEdge_X64_132.0.2957.127.exe 3240 setup.exe 5832 setup.exe 5820 pafish64.exe 3916 MicrosoftEdgeUpdate.exe 1668 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 2152 MicrosoftEdgeUpdate.exe 2016 MicrosoftEdgeUpdate.exe 6136 MicrosoftEdgeUpdateSetup_X86_1.3.195.43.exe 5820 MicrosoftEdgeUpdate.exe 3032 MicrosoftEdgeUpdate.exe 5368 MicrosoftEdgeUpdate.exe 5652 MicrosoftEdgeUpdate.exe 3468 MicrosoftEdgeUpdateComRegisterShell64.exe 2768 MicrosoftEdgeUpdateComRegisterShell64.exe 5300 MicrosoftEdgeUpdateComRegisterShell64.exe 1928 MicrosoftEdgeUpdate.exe 460 spoclsv.exe 4068 svchost.exe 1180 taskhost.exe 5672 svchost.exe 556 taskhost.exe 5884 svchost.exe 3588 taskhost.exe 2056 svchost.exe 2404 taskhost.exe 5712 svchost.exe 1356 svchost.exe 3332 taskhost.exe 6036 svchost.exe 1236 taskhost.exe 4092 svchost.exe 5440 taskhost.exe 5312 svchost.exe 4320 taskhost.exe 2228 svchost.exe 2568 taskhost.exe 3456 svchost.exe 2008 taskhost.exe 1872 6AdwCleaner.exe 1928 MicrosoftEdgeUpdate.exe 2164 MicrosoftEdgeUpdate.exe 4832 MicrosoftEdgeUpdate.exe 2300 winupdate.exe 724 winupdate.exe 4996 winupdate.exe 3468 winupdate.exe 568 winupdate.exe 4868 winupdate.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Wine pafish64.exe -
Loads dropped DLL 46 IoCs
pid Process 1308 MicrosoftEdgeUpdate.exe 5236 MicrosoftEdgeUpdate.exe 5268 MicrosoftEdgeUpdate.exe 5288 MicrosoftEdgeUpdateComRegisterShell64.exe 5268 MicrosoftEdgeUpdate.exe 5316 MicrosoftEdgeUpdateComRegisterShell64.exe 5268 MicrosoftEdgeUpdate.exe 5344 MicrosoftEdgeUpdateComRegisterShell64.exe 5268 MicrosoftEdgeUpdate.exe 5384 MicrosoftEdgeUpdate.exe 5476 MicrosoftEdgeUpdate.exe 5508 MicrosoftEdgeUpdate.exe 5508 MicrosoftEdgeUpdate.exe 5476 MicrosoftEdgeUpdate.exe 5548 MicrosoftEdgeUpdate.exe 3916 MicrosoftEdgeUpdate.exe 1668 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 2152 MicrosoftEdgeUpdate.exe 2016 MicrosoftEdgeUpdate.exe 2016 MicrosoftEdgeUpdate.exe 2152 MicrosoftEdgeUpdate.exe 5820 MicrosoftEdgeUpdate.exe 3032 MicrosoftEdgeUpdate.exe 5368 MicrosoftEdgeUpdate.exe 5652 MicrosoftEdgeUpdate.exe 3468 MicrosoftEdgeUpdateComRegisterShell64.exe 5652 MicrosoftEdgeUpdate.exe 2768 MicrosoftEdgeUpdateComRegisterShell64.exe 5652 MicrosoftEdgeUpdate.exe 5300 MicrosoftEdgeUpdateComRegisterShell64.exe 5652 MicrosoftEdgeUpdate.exe 1928 MicrosoftEdgeUpdate.exe 2300 Floxif.exe 1928 MicrosoftEdgeUpdate.exe 2164 MicrosoftEdgeUpdate.exe 2164 MicrosoftEdgeUpdate.exe 1928 MicrosoftEdgeUpdate.exe 4832 MicrosoftEdgeUpdate.exe 4708 Blackkomet.exe 2300 winupdate.exe 724 winupdate.exe 4996 winupdate.exe 3468 winupdate.exe 568 winupdate.exe 4868 winupdate.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdwCleaner = "\"C:\\Users\\Admin\\AppData\\Local\\6AdwCleaner.exe\" -auto" 6AdwCleaner.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" Blackkomet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 453 raw.githubusercontent.com 454 raw.githubusercontent.com 455 raw.githubusercontent.com 456 raw.githubusercontent.com 519 0.tcp.ngrok.io 716 0.tcp.ngrok.io 731 0.tcp.ngrok.io 452 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 xpaj.exe -
Checks system information in the registry 2 TTPs 26 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File created C:\Windows\SysWOW64\Windupdt\winupdate.exe Blackkomet.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe notepad.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt attrib.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe attrib.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe notepad.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe Blackkomet.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe notepad.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe notepad.exe File opened for modification C:\Windows\SysWOW64\Windupdt attrib.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe notepad.exe File opened for modification C:\Windows\SysWOW64\Windupdt\ winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\ Blackkomet.exe File opened for modification C:\Windows\SysWOW64\Windupdt\ winupdate.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe attrib.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe notepad.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe attrib.exe File opened for modification C:\Windows\SysWOW64\Windupdt\ winupdate.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe notepad.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe attrib.exe File opened for modification C:\Windows\SysWOW64\Windupdt attrib.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe attrib.exe File opened for modification C:\Windows\SysWOW64\Windupdt\ winupdate.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt attrib.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\ winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt attrib.exe File opened for modification C:\Windows\SysWOW64\Windupdt\ winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe attrib.exe File opened for modification C:\Windows\SysWOW64\Windupdt attrib.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 1668 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 42 IoCs
pid Process 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 1668 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe -
resource yara_rule behavioral1/memory/2300-5030-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2300-5035-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN pafish64.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Windows.Presentation.resources.dll xpaj.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.127\telclient.dll xpaj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe xpaj.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\msedgeupdateres_mt.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Client.Windows.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBCTRAC.DLL xpaj.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\AvatarEditorImages\Catalog_LightTheme.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\particles\sparkles_main.dds RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\fonts\RomanAntique.otf RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\TerrainEditor\lake.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Web.Entity.Design.Resources.dll xpaj.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\DevConsole\Maximize.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\MaterialFramework\List.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\Settings\MenuBarIcons\ReportAbuseTab.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\VirtualCursor\cursorDefault.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.127\Trust Protection Lists\Sigma\Staging setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.195.43\MicrosoftEdgeUpdateSetup_X86_1.3.195.43.exe MicrosoftEdgeUpdate.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\ExtraContent\textures\ui\Controls\DesignSystem\DpadRight.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\Locales\ca.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.127\onnxruntime.dll xpajB.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdateSetup.exe xpaj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\libfile_keystore_plugin.dll xpaj.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\configs\DateTimeLocaleConfigs\es-es.json RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\Controls\PlayStationController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\Controls\XboxController\DPadDown.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\ExtraContent\textures\ui\LuaApp\graphic\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\ExtraContent\textures\ui\LuaChat\graphic\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\api-ms-win-core-interlocked-l1-1-0.dll RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msdatt.dll xpajB.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\CompositorDebugger\settings.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\Controls\DefaultController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\ExtraContent\textures\ui\LuaChat\icons\ic-leave.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\eula.dll xpaj.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\GameSettings\ScrollBarTop.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\RoactStudioWidgets\slider_handle_dark.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Net.Resources.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe xpaj.exe File created C:\Program Files\7-Zip\Uninstall.exe Zika.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\AnimationEditor\TangentHandle_Automatic_9x9.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\fonts\families\Oswald.json RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\TerrainTools\mtrl_slate.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\Controls\PlayStationController\Thumbstick2.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\PlayerList\AcceptButton.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_duplicate_plugin.dll xpaj.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\Menu\rectBackground.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\ExtraContent\textures\ui\LuaChat\icons\ic-createchat1-24x24.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.127\Locales\ja.pak setup.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Data.Services.Client.resources.dll xpaj.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\Microsoft.PackageManagement.MsiProvider.dll xpaj.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jsdt.dll xpaj.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\DeveloperFramework\Favorites\star_stroke.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\fonts\families\RomanAntique.json RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\api-ms-win-crt-runtime-l1-1-0.dll RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.ComponentModel.DataAnnotations.dll xpaj.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\Microsoft.PowerShell.PackageManagement.dll xpaj.exe File opened for modification C:\Program Files\Mozilla Firefox\gkcodecs.dll xpaj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Document.dll xpaj.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\StudioSharedUI\filter.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\Controls\DesignSystem\[email protected] RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.127\onnxruntime.dll xpaj.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\vk_swiftshader.dll xpaj.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\common\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\content\textures\ui\InspectMenu\[email protected] RobloxPlayerInstaller.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\notepad.dll.sys.exe Zika.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Windows\notepad.dll.sys.exe Zika.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\Downloads\pafish64.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe:Zone.Identifier firefox.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 2820 2300 WerFault.exe 163 5472 4708 WerFault.exe 203 5468 2300 WerFault.exe 213 4552 724 WerFault.exe 222 2784 1084 WerFault.exe 232 5840 2820 WerFault.exe 234 2592 4996 WerFault.exe 231 5284 3468 WerFault.exe 244 3028 568 WerFault.exe 253 5868 4868 WerFault.exe 262 3192 5776 WerFault.exe 272 5388 5648 WerFault.exe 271 5636 188 WerFault.exe 282 5584 1056 WerFault.exe 291 5584 3012 WerFault.exe 300 2708 2724 WerFault.exe 309 6192 2848 WerFault.exe 318 6376 6236 WerFault.exe 329 6508 6228 WerFault.exe 328 6792 6544 WerFault.exe 339 7100 6864 WerFault.exe 348 2820 6156 WerFault.exe 359 6672 6492 WerFault.exe 368 6884 6624 WerFault.exe 377 6272 6924 WerFault.exe 386 6672 6152 WerFault.exe 398 6472 3980 WerFault.exe 396 3056 6852 WerFault.exe 407 6244 6308 WerFault.exe 417 6760 3524 WerFault.exe 426 680 6988 WerFault.exe 437 3568 6528 WerFault.exe 446 5748 6612 WerFault.exe 456 7704 7420 WerFault.exe 469 8164 7900 WerFault.exe 478 7596 6308 WerFault.exe 487 7448 7724 WerFault.exe 496 7332 7420 WerFault.exe 505 7424 7656 WerFault.exe 514 7940 8144 WerFault.exe 523 7540 7532 WerFault.exe 532 7804 7336 WerFault.exe 541 7420 8164 WerFault.exe 550 8216 7336 WerFault.exe 559 8456 8244 WerFault.exe 568 8724 8500 WerFault.exe 577 8960 8752 WerFault.exe 586 8144 9004 WerFault.exe 595 8448 6612 WerFault.exe 604 8536 8480 WerFault.exe 613 8196 8524 WerFault.exe 622 8212 8144 WerFault.exe 631 9208 8728 WerFault.exe 640 8372 9136 WerFault.exe 649 4216 8076 WerFault.exe 658 9104 9208 WerFault.exe 668 8148 8440 WerFault.exe 677 7704 9212 WerFault.exe 686 824 9000 WerFault.exe 695 9164 8304 WerFault.exe 704 9476 9240 WerFault.exe 713 9736 9508 WerFault.exe 722 9992 9764 WerFault.exe 731 9220 10024 WerFault.exe 740 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdateSetup_X86_1.3.195.43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mabezat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Floxif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blackkomet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpySheriff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zika.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 29592 MicrosoftEdgeUpdate.exe 5384 MicrosoftEdgeUpdate.exe 5548 MicrosoftEdgeUpdate.exe 3916 MicrosoftEdgeUpdate.exe 5820 MicrosoftEdgeUpdate.exe 1928 MicrosoftEdgeUpdate.exe 4832 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 16 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\NumMethods\ = "6" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ = "ICoCreateAsync" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\LocalizedString = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.43\\msedgeupdate.dll,-3000" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\ProgID\ = "MicrosoftEdgeUpdate.Update3WebSvc.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ = "IAppCommand2" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\ELEVATION MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\LocalService = "edgeupdatem" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\NumMethods\ = "13" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CredentialDialogMachine\CLSID\ = "{5F6A18BB-6231-424B-8242-19E5BB94F8ED}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A0B482A5-71D4-4395-857C-1F3B57FB8809}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.43\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ = "IJobObserver2" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods\ = "43" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\NumMethods\ = "27" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.OnDemandCOMClassSvc" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\PROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ProgID\ = "MicrosoftEdgeUpdate.OnDemandCOMClassSvc.1.0" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\PROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\NumMethods\ = "8" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E} MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{41E1FADF-C62D-4DF4-A0A2-A3BEB272D8AF}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA 6AdwCleaner.exe Set value (data) \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA\Blob = 0300000001000000140000008ad5c9987e6f190bd6f5416e2de44ccd641d8cda140000000100000014000000daed6474149c143cabdd99a9bd5b284d8b3cc9d8040000000100000010000000ff5fbc4290fa389e798467ebd7ae940b0f0000000100000014000000c45627b5584bf62327df60d6185744a2d2f2bcbf190000000100000010000000e843ac3b52ec8c297fa948c9b1fb28195c00000001000000040000000008000018000000010000001000000045ed9bbc5e43d3b9ecd63c060db78e5c4b0000000100000044000000350034003500370041003800430045003400420032004100370034003900390046003800320039003900410030003100330042003600450031004300370043005f000000200000000100000088040000308204843082036ca0030201020210421af2940984191f520a4bc62426a74b300d06092a864886f70d0101050500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74301e170d3035303630373038303931305a170d3230303533303130343833385a308195310b3009060355040613025553310b3009060355040813025554311730150603550407130e53616c74204c616b652043697479311e301c060355040a131554686520555345525452555354204e6574776f726b3121301f060355040b1318687474703a2f2f7777772e7573657274727573742e636f6d311d301b0603550403131455544e2d5553455246697273742d4f626a65637430820122300d06092a864886f70d01010105000382010f003082010a0282010100ceaa813fa3a36178aa31005595119e270f1f1cdf3a9b826830c04a611df12f0efabe79f7a523ef55519684cddbe3b96e3e31d80a2067c7f4d9bf94eb47043e02ce2aa25d870409f6309d188a97b2aa1cfc41d2a136cbfb3d91bae7d97035fae4e790c39ba39bd33cf5129977b1b709e068e61cb8f39463886a6afe0b76c9bef422e467b9ab1a5e77c18507dd0d6cbfee06c7776a419ea70fd7fbee9417b7fc85bea4abc41c31ddd7b6d1e4f0efdf168fb25293d7a1d489a1072ebfe10112421e1ae1d89534db647928ffba2e11c2e5e85b9248fb470bc26cdaad328341f3a5e54170fd65906dfafa51c4f9bd962b19042cd36da7dcf07f6f8365e26aab8786750203010001a381f43081f1301f0603551d23041830168014adbd987a34b426f7fac42654ef03bde024cb541a301d0603551d0e04160414daed6474149c143cabdd99a9bd5b284d8b3cc9d8300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff30110603551d20040a300830060604551d200030440603551d1f043d303b3039a037a0358633687474703a2f2f63726c2e7573657274727573742e636f6d2f416464547275737445787465726e616c4341526f6f742e63726c303506082b0601050507010104293027302506082b060105050730018619687474703a2f2f6f6373702e7573657274727573742e636f6d300d06092a864886f70d010105050003820101004d422fa6c18aeb07809058468cf81939662a3c5a2c6dcfd4d987558d790b12887b408fd5c7f84b8d551663adb757dc3b2bbdd3c14f1e03874b449be3e2404526f326492b6a84f1547ad442dafcd36abb667eca9eeae9bbdc07c7c3924e833c81499f92d53209ea492ea111719a36d2c54e68b6cb0e1b2516af6cde5d76d81f72b193268617db18deaf45e9dffb98af1418eda45ef6899445f055044addff27dd064a40f6b4bcf1e40f9902bbfd5d0e2e28c1be3b5f1a3f971084bc163ed8a39c631d66cb5c5fda3ef30f0a093522dbdbc03f00f9e60d5d67d1fda01e032bd940f7becc87665480a6a3b8f51962d5d226b19826ee9acb44a7455a8195151af551 6AdwCleaner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 6AdwCleaner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 6AdwCleaner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 19000000010000001000000045ed9bbc5e43d3b9ecd63c060db78e5c03000000010000001400000002faf3e291435468607857694df5e45b6885186868000000010000000800000000409120d035d9017e0000000100000008000000000063f58926d7011d000000010000001000000006f9583c00a763c23fb9e065a3366d55140000000100000014000000adbd987a34b426f7fac42654ef03bde024cb541a620000000100000020000000687fa451382278fff0c8b11f8d43d576671c6eb2bceab413fb83d965d06d2ff20b00000001000000260000005300650063007400690067006f0020002800410064006400540072007500730074002900000053000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000001400000009b9105c5bba24343ca7f341c624e183f6ee7c1b20000000010000003a040000308204363082031ea003020102020101300d06092a864886f70d0101050500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74301e170d3030303533303130343833385a170d3230303533303130343833385a306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100b7f71a33e6f200042d39e04e5bed1fbc6c0fcdb5fa23b6cede9b113397a4294c7d939fbd4abc93ed031ae38fcfe56d505ad69729945a80b0497adb2e95fdb8cabf37382d1e3e9141ad7056c7f04f3fe8329e74cac89054e9c65f0f789d9a403c0eac61aa5e148f9e87a16a50dcd79a4eaf05b3a671949c71b350600ac7139d38078602a8e9a869261890ab4cb04f23ab3a4f84d8dfce9fe1696fbbd742d76b44e4c7adee6d415f725a710837b37965a459a09437f7002f0dc29272dad03872db14a845c45d2a7db7b4d6c4eeaccd1344b7c92bdd430025fa61b9696a582311b7a7338f567559f5cd29d746b70a2b65b6d3426f15b2b87bfbefe95d53d5345a270203010001a381dc3081d9301d0603551d0e04160414adbd987a34b426f7fac42654ef03bde024cb541a300b0603551d0f040403020106300f0603551d130101ff040530030101ff3081990603551d2304819130818e8014adbd987a34b426f7fac42654ef03bde024cb541aa173a471306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74820101300d06092a864886f70d01010505000382010100b09be08525c2d623e20f9606929d41989cd9847981d91e5b14072336658fb0d877bbac416c47608351b0f9323de7fcf62613c78016a5bf5afc87cf787989219ae24c070a8635bcf2de51c4d296b7dc7e4eee70fd1c39eb0c0251142d8ebd16e0c1df4675e724adecf442b48593701067ba9d06354a18d32b7acc5142a17a63d1e6bba1c52bc236be130de6bd637e797ba7090d40ab6add8f8ac3f6f68c1a420551d445f59fa76221681520433c99e77cbd24d8a9911773883f561b313818b4710f9acdc80e9e8e2e1be18c9883cb1f31f1444cc604734976600fc7f8bd17806b2ee9cc4c0e5a9a790f200a2ed59e63261e559294d882175a7bd0bcc78f4e8604 6AdwCleaner.exe -
NTFS ADS 5 IoCs
description ioc Process File created C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\pafish64.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Desktop\eicar_com.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\The-MALWARE-Repo-master.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\BabylonClient12.msi:Zone.Identifier firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 34764 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 4 IoCs
pid Process 4508 WINWORD.EXE 4508 WINWORD.EXE 3588 WINWORD.EXE 3588 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4408 RobloxPlayerInstaller.exe 4408 RobloxPlayerInstaller.exe 1308 MicrosoftEdgeUpdate.exe 1308 MicrosoftEdgeUpdate.exe 1308 MicrosoftEdgeUpdate.exe 1308 MicrosoftEdgeUpdate.exe 1308 MicrosoftEdgeUpdate.exe 1308 MicrosoftEdgeUpdate.exe 1668 RobloxPlayerBeta.exe 5820 pafish64.exe 5820 pafish64.exe 5480 RobloxPlayerBeta.exe 2152 MicrosoftEdgeUpdate.exe 2152 MicrosoftEdgeUpdate.exe 2152 MicrosoftEdgeUpdate.exe 2152 MicrosoftEdgeUpdate.exe 2016 MicrosoftEdgeUpdate.exe 2016 MicrosoftEdgeUpdate.exe 3032 MicrosoftEdgeUpdate.exe 3032 MicrosoftEdgeUpdate.exe 2300 Floxif.exe 2300 Floxif.exe 3608 Gnil.exe 3608 Gnil.exe 3608 Gnil.exe 3608 Gnil.exe 3608 Gnil.exe 3608 Gnil.exe 460 spoclsv.exe 460 spoclsv.exe 1928 MicrosoftEdgeUpdate.exe 1928 MicrosoftEdgeUpdate.exe 1928 MicrosoftEdgeUpdate.exe 1928 MicrosoftEdgeUpdate.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2852 firefox.exe 4456 xpajB.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 4408 RobloxPlayerInstaller.exe Token: SeDebugPrivilege 4408 RobloxPlayerInstaller.exe Token: SeDebugPrivilege 4408 RobloxPlayerInstaller.exe Token: SeDebugPrivilege 4408 RobloxPlayerInstaller.exe Token: SeDebugPrivilege 4408 RobloxPlayerInstaller.exe Token: SeDebugPrivilege 4408 RobloxPlayerInstaller.exe Token: SeDebugPrivilege 1308 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 1308 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 4408 RobloxPlayerInstaller.exe Token: SeDebugPrivilege 4408 RobloxPlayerInstaller.exe Token: SeDebugPrivilege 4408 RobloxPlayerInstaller.exe Token: SeDebugPrivilege 4408 RobloxPlayerInstaller.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2152 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2016 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 3032 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2300 Floxif.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2644 Zika.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 1872 6AdwCleaner.exe Token: SeDebugPrivilege 1928 MicrosoftEdgeUpdate.exe Token: SeIncreaseQuotaPrivilege 4708 Blackkomet.exe Token: SeSecurityPrivilege 4708 Blackkomet.exe Token: SeTakeOwnershipPrivilege 4708 Blackkomet.exe Token: SeLoadDriverPrivilege 4708 Blackkomet.exe Token: SeSystemProfilePrivilege 4708 Blackkomet.exe Token: SeSystemtimePrivilege 4708 Blackkomet.exe Token: SeProfSingleProcessPrivilege 4708 Blackkomet.exe Token: SeIncBasePriorityPrivilege 4708 Blackkomet.exe Token: SeCreatePagefilePrivilege 4708 Blackkomet.exe Token: SeBackupPrivilege 4708 Blackkomet.exe Token: SeRestorePrivilege 4708 Blackkomet.exe Token: SeShutdownPrivilege 4708 Blackkomet.exe Token: SeDebugPrivilege 4708 Blackkomet.exe Token: SeSystemEnvironmentPrivilege 4708 Blackkomet.exe Token: SeChangeNotifyPrivilege 4708 Blackkomet.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 1872 6AdwCleaner.exe 4308 SpySheriff.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 5820 pafish64.exe 5820 pafish64.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 4508 WINWORD.EXE 4508 WINWORD.EXE 4508 WINWORD.EXE 4508 WINWORD.EXE 4508 WINWORD.EXE 4508 WINWORD.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1668 RobloxPlayerBeta.exe 5480 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 4352 wrote to memory of 2852 4352 firefox.exe 89 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 3960 2852 firefox.exe 90 PID 2852 wrote to memory of 1108 2852 firefox.exe 91 PID 2852 wrote to memory of 1108 2852 firefox.exe 91 PID 2852 wrote to memory of 1108 2852 firefox.exe 91 PID 2852 wrote to memory of 1108 2852 firefox.exe 91 PID 2852 wrote to memory of 1108 2852 firefox.exe 91 PID 2852 wrote to memory of 1108 2852 firefox.exe 91 PID 2852 wrote to memory of 1108 2852 firefox.exe 91 PID 2852 wrote to memory of 1108 2852 firefox.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 64 IoCs
pid Process 6832 attrib.exe 8156 attrib.exe 8588 attrib.exe 4236 attrib.exe 10864 attrib.exe 6488 attrib.exe 6936 attrib.exe 7492 attrib.exe 9108 attrib.exe 10560 attrib.exe 4676 attrib.exe 6320 attrib.exe 8724 attrib.exe 8952 attrib.exe 384 attrib.exe 2688 attrib.exe 1472 attrib.exe 2824 attrib.exe 32 attrib.exe 6928 attrib.exe 6672 attrib.exe 6400 attrib.exe 8308 attrib.exe 8244 attrib.exe 8472 attrib.exe 9804 attrib.exe 2868 attrib.exe 29732 attrib.exe 6488 attrib.exe 8348 attrib.exe 6940 attrib.exe 3572 attrib.exe 7484 attrib.exe 3596 attrib.exe 1540 attrib.exe 7040 attrib.exe 7312 attrib.exe 8572 attrib.exe 9668 attrib.exe 10176 attrib.exe 5264 attrib.exe 7292 attrib.exe 8988 attrib.exe 6384 attrib.exe 15228 attrib.exe 18004 attrib.exe 4708 attrib.exe 10692 attrib.exe 392 attrib.exe 9140 attrib.exe 7968 attrib.exe 7532 attrib.exe 9068 attrib.exe 9076 attrib.exe 9808 attrib.exe 7152 attrib.exe 4628 attrib.exe 3524 attrib.exe 9852 attrib.exe 9264 attrib.exe 31960 attrib.exe 5864 attrib.exe 4632 attrib.exe 568 attrib.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\sample.js1⤵PID:832
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Downloads MZ/PE file
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1932 -parentBuildID 20240401114208 -prefsHandle 1848 -prefMapHandle 1832 -prefsLen 27199 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b1c77fd-a37d-44fa-8bd7-4914ed80a9dc} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" gpu3⤵PID:3960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2380 -parentBuildID 20240401114208 -prefsHandle 2372 -prefMapHandle 2368 -prefsLen 27077 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a3be777-d84b-4e8d-8dd6-c3b82c0d16c9} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" socket3⤵PID:1108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3060 -childID 1 -isForBrowser -prefsHandle 3040 -prefMapHandle 3032 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {27f77469-a568-4825-9d5c-94a813e656f5} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:1912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4080 -childID 2 -isForBrowser -prefsHandle 4072 -prefMapHandle 4068 -prefsLen 32451 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c08551cb-413b-4758-bc96-5aece44bd1ac} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:4452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4664 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4700 -prefMapHandle 4696 -prefsLen 32451 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b87765c-16b6-4d8a-8910-2b1f39936df5} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" utility3⤵
- Checks processor information in registry
PID:1940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5424 -childID 3 -isForBrowser -prefsHandle 5148 -prefMapHandle 5408 -prefsLen 27257 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {384eb3ca-6992-4788-9103-e201be4d5a3e} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:1996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5528 -childID 4 -isForBrowser -prefsHandle 5568 -prefMapHandle 5572 -prefsLen 27257 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {393da500-18c8-4ff0-8a1e-6910293d6f07} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:2624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 5 -isForBrowser -prefsHandle 5804 -prefMapHandle 5808 -prefsLen 27257 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {23e07e70-a5e9-42dc-b0fa-16d7bc7b322d} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:3924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6180 -childID 6 -isForBrowser -prefsHandle 6172 -prefMapHandle 6156 -prefsLen 27257 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cfe14dd9-3410-4f59-b902-0694ab848ec0} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:2068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5488 -childID 7 -isForBrowser -prefsHandle 4636 -prefMapHandle 4568 -prefsLen 27995 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c327539e-114c-428b-8941-d0d845b8dccf} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:2564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6532 -parentBuildID 20240401114208 -prefsHandle 6544 -prefMapHandle 6536 -prefsLen 33884 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb6d2315-fa4f-4f7e-bc6d-e475c778e5f5} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" rdd3⤵PID:1892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6560 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 6552 -prefMapHandle 6540 -prefsLen 33884 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea9148b0-0158-41d0-bfa5-49d5b6c1868f} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" utility3⤵
- Checks processor information in registry
PID:3408
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408 -
C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:344 -
C:\Program Files (x86)\Microsoft\Temp\EU6FB3.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU6FB3.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"5⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5236
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5268 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5288
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5316
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5344
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTU5MEJEODYtOTZGNy00M0I2LUEwQTEtMUVDOUNCQTMwQzNBfSIgdXNlcmlkPSJ7Rjc1QTdDN0UtM0I2Mi00OUQyLUI3NjYtRjAzNjI1N0RFQUVGfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InszNkZFMzUzMC0yMUUzLTQ5ODAtQTVCOS00NTdCOTE0RjNDNTV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjYzNTQ5OTU3MiIgaW5zdGFsbF90aW1lX21zPSIzNzMiLz48L2FwcD48L3JlcXVlc3Q-6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Network Configuration Discovery: Internet Connection Discovery
PID:5384
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{A590BD86-96F7-43B6-A0A1-1EC9CBA30C3A}" /silent6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5476
-
-
-
-
C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\RobloxPlayerBeta.exe" -app -clientLaunchTimeEpochMs 0 -isInstallerLaunch 44084⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1668
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4656 -childID 8 -isForBrowser -prefsHandle 5104 -prefMapHandle 5088 -prefsLen 28085 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {251233c3-9a53-4259-b5b8-22e5722cf91b} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:1992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5624 -childID 9 -isForBrowser -prefsHandle 6376 -prefMapHandle 8648 -prefsLen 28085 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a77e4e28-76ae-4c1c-9822-a1dd484bc162} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:6020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8004 -childID 10 -isForBrowser -prefsHandle 5620 -prefMapHandle 5784 -prefsLen 28085 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {76e0d77f-ad9f-4448-af28-52f34d950913} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:6076
-
-
C:\Users\Admin\Downloads\pafish64.exe"C:\Users\Admin\Downloads\pafish64.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4232 -childID 11 -isForBrowser -prefsHandle 6308 -prefMapHandle 1308 -prefsLen 33924 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cbc4408a-5da0-4cc7-89ed-0edd6672e3fe} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:5620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8736 -childID 12 -isForBrowser -prefsHandle 5772 -prefMapHandle 8816 -prefsLen 28085 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7476ab96-257b-4072-ab63-3e4c8b29f830} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:3092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2692 -childID 13 -isForBrowser -prefsHandle 7420 -prefMapHandle 7776 -prefsLen 28085 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7703dc86-05d3-4e1d-93b7-109530e340d1} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:5816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8960 -childID 14 -isForBrowser -prefsHandle 7732 -prefMapHandle 9156 -prefsLen 28085 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4463faf0-3ebc-495a-a6c8-df689214038b} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:3232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8716 -childID 15 -isForBrowser -prefsHandle 8700 -prefMapHandle 5624 -prefsLen 28175 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4cf166fe-1531-48f9-aec7-d196216aa079} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:1504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=10360 -childID 16 -isForBrowser -prefsHandle 9724 -prefMapHandle 9012 -prefsLen 28175 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f50c7828-0537-43f0-b64e-99bee35b2d6e} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:3132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6168 -childID 17 -isForBrowser -prefsHandle 4504 -prefMapHandle 5732 -prefsLen 28419 -prefMapSize 244658 -jsInitHandle 1196 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {702b11b3-e804-401f-8e69-2f18aec539af} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab3⤵PID:4532
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:5508 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTU5MEJEODYtOTZGNy00M0I2LUEwQTEtMUVDOUNCQTMwQzNBfSIgdXNlcmlkPSJ7Rjc1QTdDN0UtM0I2Mi00OUQyLUI3NjYtRjAzNjI1N0RFQUVGfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins1NzQyREZCRi05MjhCLTQ5ODAtQTBBRi1FQTM3QzFBNTA3MEF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQ0LjQ1MjkiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxMjUiIGlzX3dpcD0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSI1IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2NjQwMzg5NTc4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5548
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4BF7C22D-1667-4EF0-BA82-9D6995F1CACF}\MicrosoftEdge_X64_132.0.2957.127.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4BF7C22D-1667-4EF0-BA82-9D6995F1CACF}\MicrosoftEdge_X64_132.0.2957.127.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:5788 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4BF7C22D-1667-4EF0-BA82-9D6995F1CACF}\EDGEMITMP_18873.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4BF7C22D-1667-4EF0-BA82-9D6995F1CACF}\EDGEMITMP_18873.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4BF7C22D-1667-4EF0-BA82-9D6995F1CACF}\MicrosoftEdge_X64_132.0.2957.127.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:3240 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4BF7C22D-1667-4EF0-BA82-9D6995F1CACF}\EDGEMITMP_18873.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4BF7C22D-1667-4EF0-BA82-9D6995F1CACF}\EDGEMITMP_18873.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4BF7C22D-1667-4EF0-BA82-9D6995F1CACF}\EDGEMITMP_18873.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x160,0x164,0x16c,0x158,0x168,0x7ff67e56a818,0x7ff67e56a824,0x7ff67e56a8304⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5832
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTU5MEJEODYtOTZGNy00M0I2LUEwQTEtMUVDOUNCQTMwQzNBfSIgdXNlcmlkPSJ7Rjc1QTdDN0UtM0I2Mi00OUQyLUI3NjYtRjAzNjI1N0RFQUVGfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins1OEI3QjdFQS02MEY0LTRBNkItQTE3Ri0xRDcwMUZGQjRCQ0F9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQ0LjQ1MjkiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxMjUiIGlzX3dpcD0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEzMi4wLjI5NTcuMTI3IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2NjQ4OTU5Njg4IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Network Configuration Discovery: Internet Connection Discovery
PID:3916
-
-
C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:R7y2JMNuuB70geOxgdt3vpMNPHc8G-QA-YC9uEITrht6tr70vjJo-ecXBnQi9xXnK3La9bYiLnJySkyOHKSTF78FAQ2FfucJWR02BnqG5M63Gt4BP7B2GmxGZRCBnDpbsAgTP0qJ9ugGd6a8xgvA1QYjlYIOQ2GV-un-Ltn6aMvaSnPHZM8GBQNAQ58ZIWItI8AzGHBuaOw_W1-_1-xCFulwembjLBlS_YlUBWqnI_8+launchtime:1738145030304+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1738144808261003%26placeId%3D192800%26isPlayTogetherGame%3Dfalse%26referredByPlayerId%3D0%26joinAttemptId%3D12727509-ec03-465f-ad6d-c86aae6487a2%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1738144808261003+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:5480
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1980
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{09B8E955-2B11-4ED8-974C-98DE33838F4B}\MicrosoftEdgeUpdateSetup_X86_1.3.195.43.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{09B8E955-2B11-4ED8-974C-98DE33838F4B}\MicrosoftEdgeUpdateSetup_X86_1.3.195.43.exe" /update /sessionid "{1CCA7245-8DF2-43D1-A712-46D01FE6ACC9}"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6136 -
C:\Program Files (x86)\Microsoft\Temp\EU54CB.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU54CB.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{1CCA7245-8DF2-43D1-A712-46D01FE6ACC9}"3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5368
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5652 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3468
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2768
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5300
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTcxLjM5IiBuZXh0dmVyc2lvbj0iMS4zLjE5NS40MyIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRldGltZT0iMTczODE0NDkwNSI-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTA1MDQ1NDkxNDkiLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1928
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MUNDQTcyNDUtOERGMi00M0QxLUE3MTItNDZEMDFGRTZBQ0M5fSIgdXNlcmlkPSJ7Rjc1QTdDN0UtM0I2Mi00OUQyLUI3NjYtRjAzNjI1N0RFQUVGfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins4MzYzQjA4NS1DNUJGLTQ1RDItQjg0Qi03QTYzOTJGNUVCNDJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQ0LjQ1MjkiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxMjUiIGlzX3dpcD0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNzEuMzkiIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjQzIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMCI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSIxMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iOTkzNjk1NzQ3OCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI5OTM3MTEzNTY5IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIwIiBlcnJvcmNvZGU9Ii0yMTQ3MDIzODM4IiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDQ4NDE2ODMzOCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iZG8iIHVybD0iaHR0cDovL21zZWRnZS5iLnRsdS5kbC5kZWxpdmVyeS5tcC5taWNyb3NvZnQuY29tL2ZpbGVzdHJlYW1pbmdzZXJ2aWNlL2ZpbGVzLzIwN2U4MDM1LTk5YmUtNDVkMi1iMmFhLTE4NWY2NzA5YzQwMz9QMT0xNzM4NzUwMDM2JmFtcDtQMj00MDQmYW1wO1AzPTImYW1wO1A0PW4zQjFlZG9sJTJmTTNMekklMmZicHUxQUtSZkFYZEJWTDlyJTJiNEVwS2dxNk52SmxBVkJIT1Q4VU1pcSUyZjJ1WVBCZENnWDlQeWZhcmlCZ2dtaUxQb0hZOVg0TGclM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIwIiB0b3RhbD0iMCIgZG93bmxvYWRfdGltZV9tcz0iMCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDQ4NDIzMzY0NCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iYml0cyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvMjA3ZTgwMzUtOTliZS00NWQyLWIyYWEtMTg1ZjY3MDljNDAzP1AxPTE3Mzg3NTAwMzYmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9bjNCMWVkb2wlMmZNM0x6SSUyZmJwdTFBS1JmQVhkQlZMOXIlMmI0RXBLZ3E2TnZKbEFWQkhPVDhVTWlxJTJmMnVZUEJkQ2dYOVB5ZmFyaUJnZ21pTFBvSFk5WDRMZyUzZCUzZCIgc2VydmVyX2lwX2hpbnQ9IiIgY2RuX2NpZD0iLTEiIGNkbl9jY2M9IiIgY2RuX21zZWRnZV9yZWY9IiIgY2RuX2F6dXJlX3JlZl9vcmlnaW5fc2hpZWxkPSIiIGNkbl9jYWNoZT0iIiBjZG5fcDNwPSIiIGRvd25sb2FkZWQ9IjE2NTQzNDQiIHRvdGFsPSIxNjU0MzQ0IiBkb3dubG9hZF90aW1lX21zPSI1MDUyOCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDQ4NDIzMzY0NCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE1IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDQ4OTQwODE1NSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxwaW5nIHI9IjEiIHJkPSI2NjAyIiBwaW5nX2ZyZXNobmVzcz0iezRERTlGMEE1LUQ2NzAtNEI1NC1CRkEyLTlCQkU0QUE4QUZCMH0iLz48L2FwcD48YXBwIGFwcGlkPSJ7NTZFQjE4RjgtQjAwOC00Q0JELUI2RDItOEM5N0ZFN0U5MDYyfSIgdmVyc2lvbj0iOTIuMC45MDIuNjciIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgbGFzdF9sYXVuY2hfdGltZT0iMTMzODI1MzY5NzgyMzM2MzgwIj48dXBkYXRlY2hlY2svPjxwaW5nIGFjdGl2ZT0iMSIgYT0iMSIgcj0iMSIgYWQ9IjY2MDIiIHJkPSI2NjAyIiBwaW5nX2ZyZXNobmVzcz0iezJBMjQ5OUFBLTkxRUItNDZGNi1CQTRGLUMzMkExN0YyNUI5RH0iLz48L2FwcD48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iMTMyLjAuMjk1Ny4xMjciIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZT0iNjYwMSI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0iezQwQUFBM0MwLTY3RDMtNEUzQS05RkUzLUI4MDU3OTA0NDU5OX0iLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5820
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Browser Hijackers\BabylonToolbar.txt1⤵PID:724
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Melissa.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4508
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Melissa.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
PID:3588
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Floxif\Floxif.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Floxif\Floxif.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 2442⤵
- Program crash
PID:2820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2300 -ip 23001⤵PID:5020
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Gnil\Gnil.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Gnil\Gnil.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3608 -
C:\Windows\SysWOW64\drivers\spoclsv.exeC:\Windows\system32\drivers\spoclsv.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:460
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Mabezat\Mabezat.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Mabezat\Mabezat.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3584
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Xpaj\xpaj.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Xpaj\xpaj.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4800
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Xpaj\xpajB.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Xpaj\xpajB.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
PID:4456
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\WindowsXPHorrorEdition.txt1⤵PID:5532
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Zika.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Zika.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -extract C:\Program Files\7-Zip\7z.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, icongroup,,2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -extract C:\Program Files\7-Zip\7zFM.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, icongroup,,2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5672
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -extract C:\Program Files\7-Zip\7zG.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, icongroup,,2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5884
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -extract C:\Program Files\7-Zip\Uninstall.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, icongroup,,2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -addoverwrite C:\Program Files\7-Zip\Uninstall.exe", "C:\Program Files\7-Zip\Uninstall.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res, icongroup,,2⤵
- Executes dropped EXE
PID:5712
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, icongroup,,2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res2⤵
- Executes dropped EXE
PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, icongroup,,2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6036
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, icongroup,,2⤵
- Executes dropped EXE
PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, icongroup,,2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5312
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res2⤵
- Executes dropped EXE
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, icongroup,,2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, icongroup,,2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.rc, C:\Users\Admin\AppData\Local\Temp\8d98992da4db48fe9c07be170755ea75\icons.res2⤵
- Executes dropped EXE
PID:2008
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\BonziKill.txt1⤵PID:1996
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\rogues\AdwereCleaner.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\rogues\AdwereCleaner.exe"1⤵PID:644
-
C:\Users\Admin\AppData\Local\6AdwCleaner.exe"C:\Users\Admin\AppData\Local\6AdwCleaner.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1872
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\rogues\SpySheriff.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\rogues\SpySheriff.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:4308
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4832
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\MicrosoftEdge_X64_132.0.2957.127.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\MicrosoftEdge_X64_132.0.2957.127.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵PID:6208
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\MicrosoftEdge_X64_132.0.2957.127.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵PID:7064
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6779ea818,0x7ff6779ea824,0x7ff6779ea8304⤵PID:7140
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵PID:6956
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff6779ea818,0x7ff6779ea824,0x7ff6779ea8305⤵PID:6848
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level4⤵PID:5536
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x24c,0x250,0x254,0x248,0x1e8,0x7ff7cff2a818,0x7ff7cff2a824,0x7ff7cff2a8305⤵PID:10204
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵PID:9192
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7cff2a818,0x7ff7cff2a824,0x7ff7cff2a8305⤵PID:10884
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level4⤵PID:8304
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.127\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7cff2a818,0x7ff7cff2a824,0x7ff7cff2a8305⤵PID:860
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MUIzNzY1QUMtOUJGRi00QTA4LUJFMUItRkJEODYwOTA3MEVFfSIgdXNlcmlkPSJ7Rjc1QTdDN0UtM0I2Mi00OUQyLUI3NjYtRjAzNjI1N0RFQUVGfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntCOTZGRERCNy1ENUQ5LTRBREItODdGNi1BQzY1NzNDMEMwOTd9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQ0LjQ1MjkiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxMjUiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xOTUuNDMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBjb2hvcnQ9InJyZkAwLjQyIj48dXBkYXRlY2hlY2svPjxwaW5nIHJkPSI2NjAzIiBwaW5nX2ZyZXNobmVzcz0iezgzNDcwMzExLUQyNDctNEUyMi04Qzk3LTM4N0FCQ0U3NjVBMn0iLz48L2FwcD48YXBwIGFwcGlkPSJ7NTZFQjE4RjgtQjAwOC00Q0JELUI2RDItOEM5N0ZFN0U5MDYyfSIgdmVyc2lvbj0iOTIuMC45MDIuNjciIG5leHR2ZXJzaW9uPSIxMzIuMC4yOTU3LjEyNyIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJjb25zZW50PWZhbHNlIiBsYXN0X2xhdW5jaF9jb3VudD0iMSIgbGFzdF9sYXVuY2hfdGltZT0iMTMzODI1MzY5NzgyMzM2MzgwIj48dXBkYXRlY2hlY2svPjxldmVudCBldmVudHR5cGU9IjEyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMzczMzE0NzY1NiIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMzczMzE0NzY1NiIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMzc3MTQ4ODczNyIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE1IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMzc4OTkyMTEyNCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE0ODgzNDg1MzUyIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iNjI0IiBkb3dubG9hZGVkPSIxNzcwNzgzNTIiIHRvdGFsPSIxNzcwNzgzNTIiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIyIiBpbnN0YWxsX3RpbWVfbXM9IjEwOTAyOSIvPjxwaW5nIGFjdGl2ZT0iMCIgcmQ9IjY2MDMiIHBpbmdfZnJlc2huZXNzPSJ7OTY3QkExMUEtREFENi00QjFELUIxRUEtMDc0MTVDNUI5MDc3fSIvPjwvYXBwPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIxMzIuMC4yOTU3LjEyNyIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRlPSI2NjAxIiBjb2hvcnQ9InJyZkAwLjAxIj48dXBkYXRlY2hlY2svPjxwaW5nIHJkPSI2NjAzIiBwaW5nX2ZyZXNobmVzcz0iezgyRTA3QUE5LTNDNUEtNDJCRS1BRTJBLTA3NDhEMjg4NDY1NH0iLz48L2FwcD48L3JlcXVlc3Q-2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:29592
-
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\Blackkomet.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\Blackkomet.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5312
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\Blackkomet.exe" +s +h2⤵
- System Location Discovery: System Language Discovery
PID:3332
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT" +s +h2⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 14842⤵
- Program crash
PID:5472
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5680
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 14403⤵
- Program crash
PID:5468
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:724 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5424
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h4⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:32
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h4⤵
- Drops file in System32 directory
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 14484⤵
- Program crash
PID:4552
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Windows\SysWOW64\notepad.exenotepad5⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 806⤵
- Program crash
PID:5840
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h5⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5276
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h5⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 14325⤵
- Program crash
PID:2592
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"5⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3468 -
C:\Windows\SysWOW64\notepad.exenotepad6⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5992
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h6⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4708
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h6⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 14326⤵
- Program crash
PID:5284
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"6⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\notepad.exenotepad7⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:4516
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h7⤵
- Drops file in System32 directory
PID:4552
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h7⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 13087⤵
- Program crash
PID:3028
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:4868 -
C:\Windows\SysWOW64\notepad.exenotepad8⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1536
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h8⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:472
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h8⤵
- Drops file in System32 directory
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 14488⤵
- Program crash
PID:5868
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"8⤵PID:5648
-
C:\Windows\SysWOW64\notepad.exenotepad9⤵PID:5712
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h9⤵
- Views/modifies file attributes
PID:4632
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h9⤵
- Sets file to hidden
PID:6132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 13809⤵
- Program crash
PID:5388
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"9⤵PID:188
-
C:\Windows\SysWOW64\notepad.exenotepad10⤵PID:4476
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h10⤵
- Sets file to hidden
PID:1540 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:4708
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h10⤵
- Views/modifies file attributes
PID:3596 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:5276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 188 -s 143610⤵
- Program crash
PID:5636
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"10⤵PID:1056
-
C:\Windows\SysWOW64\notepad.exenotepad11⤵PID:3192
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h11⤵
- Sets file to hidden
- Views/modifies file attributes
PID:568
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h11⤵PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 139211⤵
- Program crash
PID:5584
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"11⤵PID:3012
-
C:\Windows\SysWOW64\notepad.exenotepad12⤵PID:5840
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h12⤵
- Sets file to hidden
PID:5536
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h12⤵PID:5468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 142412⤵
- Program crash
PID:5584
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"12⤵PID:2724
-
C:\Windows\SysWOW64\notepad.exenotepad13⤵PID:3744
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h13⤵
- Views/modifies file attributes
PID:1540
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h13⤵PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 130413⤵
- Program crash
PID:2708
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"13⤵PID:2848
-
C:\Windows\SysWOW64\notepad.exenotepad14⤵PID:2228
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h14⤵
- Sets file to hidden
PID:3728
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h14⤵
- Views/modifies file attributes
PID:5864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 143614⤵
- Program crash
PID:6192
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"14⤵PID:6228
-
C:\Windows\SysWOW64\notepad.exenotepad15⤵PID:6292
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h15⤵PID:6308
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h15⤵
- Sets file to hidden
- Views/modifies file attributes
PID:6320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6228 -s 143615⤵
- Program crash
PID:6508
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"15⤵PID:6544
-
C:\Windows\SysWOW64\notepad.exenotepad16⤵PID:6596
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h16⤵PID:6612
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h16⤵PID:6620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 143616⤵
- Program crash
PID:6792
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"16⤵PID:6864
-
C:\Windows\SysWOW64\notepad.exenotepad17⤵PID:6912
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h17⤵
- Views/modifies file attributes
PID:6928
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h17⤵
- Views/modifies file attributes
PID:6936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6864 -s 144017⤵
- Program crash
PID:7100
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"17⤵PID:6156
-
C:\Windows\SysWOW64\notepad.exenotepad18⤵PID:5388
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h18⤵PID:5536
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h18⤵PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6156 -s 142018⤵
- Program crash
PID:2820
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"18⤵PID:6492
-
C:\Windows\SysWOW64\notepad.exenotepad19⤵PID:6444
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h19⤵PID:6464
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h19⤵PID:6364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6492 -s 143619⤵
- Program crash
PID:6672
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"19⤵PID:6624
-
C:\Windows\SysWOW64\notepad.exenotepad20⤵PID:6772
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h20⤵PID:6812
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h20⤵
- Views/modifies file attributes
PID:6832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6624 -s 143220⤵
- Program crash
PID:6884
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"20⤵PID:6924
-
C:\Windows\SysWOW64\notepad.exenotepad21⤵PID:7052
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h21⤵
- Sets file to hidden
- Views/modifies file attributes
PID:7040
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h21⤵
- Sets file to hidden
PID:7024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6924 -s 142821⤵
- Program crash
PID:6272
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"21⤵PID:3980
-
C:\Windows\SysWOW64\notepad.exenotepad22⤵PID:6152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6152 -s 8423⤵
- Program crash
PID:6672
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h22⤵PID:6260
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h22⤵PID:6448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 143222⤵
- Program crash
PID:6472
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"22⤵PID:6852
-
C:\Windows\SysWOW64\notepad.exenotepad23⤵PID:6704
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h23⤵PID:6804
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h23⤵PID:6636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6852 -s 142823⤵
- Program crash
PID:3056
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"23⤵PID:6308
-
C:\Windows\SysWOW64\notepad.exenotepad24⤵PID:6784
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h24⤵
- Views/modifies file attributes
PID:6672
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h24⤵
- Sets file to hidden
PID:6268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6308 -s 143624⤵
- Program crash
PID:6244
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"24⤵PID:3524
-
C:\Windows\SysWOW64\notepad.exenotepad25⤵PID:5636
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h25⤵
- Views/modifies file attributes
PID:6400
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h25⤵PID:6804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 142425⤵
- Program crash
PID:6760
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"25⤵PID:6988
-
C:\Windows\SysWOW64\notepad.exenotepad26⤵PID:6484
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h26⤵
- Sets file to hidden
PID:6492
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h26⤵PID:6328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6988 -s 142826⤵
- Program crash
PID:680
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"26⤵PID:6528
-
C:\Windows\SysWOW64\notepad.exenotepad27⤵PID:6332
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h27⤵
- Sets file to hidden
PID:3980
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h27⤵
- Sets file to hidden
PID:5776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6528 -s 142827⤵
- Program crash
PID:3568
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"27⤵PID:6612
-
C:\Windows\SysWOW64\notepad.exenotepad28⤵PID:5460
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h28⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3524
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h28⤵
- Sets file to hidden
PID:7096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6612 -s 142828⤵
- Program crash
PID:5748
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"28⤵PID:7420
-
C:\Windows\SysWOW64\notepad.exenotepad29⤵PID:7468
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h29⤵
- Views/modifies file attributes
PID:7484
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h29⤵
- Views/modifies file attributes
PID:7492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7420 -s 143629⤵
- Program crash
PID:7704
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"29⤵PID:7900
-
C:\Windows\SysWOW64\notepad.exenotepad30⤵PID:7948
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h30⤵PID:7964
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h30⤵PID:7972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7900 -s 143630⤵
- Program crash
PID:8164
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"30⤵PID:6308
-
C:\Windows\SysWOW64\notepad.exenotepad31⤵PID:7408
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h31⤵PID:7292
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h31⤵
- Sets file to hidden
PID:7336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6308 -s 144031⤵
- Program crash
PID:7596
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"31⤵PID:7724
-
C:\Windows\SysWOW64\notepad.exenotepad32⤵PID:7772
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h32⤵PID:7788
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h32⤵
- Sets file to hidden
PID:7804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7724 -s 143632⤵
- Program crash
PID:7448
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"32⤵PID:7420
-
C:\Windows\SysWOW64\notepad.exenotepad33⤵PID:8072
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h33⤵PID:8020
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h33⤵
- Views/modifies file attributes
PID:7968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7420 -s 143633⤵
- Program crash
PID:7332
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"33⤵PID:7656
-
C:\Windows\SysWOW64\notepad.exenotepad34⤵PID:7596
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h34⤵
- Views/modifies file attributes
PID:6488
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h34⤵
- Views/modifies file attributes
PID:7312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7656 -s 142834⤵
- Program crash
PID:7424
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"34⤵PID:8144
-
C:\Windows\SysWOW64\notepad.exenotepad35⤵PID:7232
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h35⤵
- Views/modifies file attributes
PID:8156
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h35⤵PID:7996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8144 -s 142435⤵
- Program crash
PID:7940
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"35⤵PID:7532
-
C:\Windows\SysWOW64\notepad.exenotepad36⤵PID:7492
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h36⤵
- Sets file to hidden
PID:6372
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h36⤵
- Sets file to hidden
PID:7576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 143236⤵
- Program crash
PID:7540
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"36⤵PID:7336
-
C:\Windows\SysWOW64\notepad.exenotepad37⤵PID:7904
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h37⤵
- Sets file to hidden
PID:7940
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h37⤵PID:7188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7336 -s 142837⤵
- Program crash
PID:7804
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"37⤵PID:8164
-
C:\Windows\SysWOW64\notepad.exenotepad38⤵PID:7824
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h38⤵PID:7532
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h38⤵PID:7944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8164 -s 143638⤵
- Program crash
PID:7420
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"38⤵PID:7336
-
C:\Windows\SysWOW64\notepad.exenotepad39⤵PID:7400
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h39⤵PID:6308
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h39⤵
- Views/modifies file attributes
PID:7532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7336 -s 138039⤵
- Program crash
PID:8216
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"39⤵PID:8244
-
C:\Windows\SysWOW64\notepad.exenotepad40⤵PID:8292
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h40⤵
- Sets file to hidden
- Views/modifies file attributes
PID:8308
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h40⤵
- Sets file to hidden
PID:8316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8244 -s 144440⤵
- Program crash
PID:8456
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"40⤵PID:8500
-
C:\Windows\SysWOW64\notepad.exenotepad41⤵PID:8548
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h41⤵PID:8564
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h41⤵
- Views/modifies file attributes
PID:8572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8500 -s 143241⤵
- Program crash
PID:8724
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"41⤵PID:8752
-
C:\Windows\SysWOW64\notepad.exenotepad42⤵PID:8804
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h42⤵PID:8820
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h42⤵
- Sets file to hidden
PID:8828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8752 -s 143242⤵
- Program crash
PID:8960
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"42⤵PID:9004
-
C:\Windows\SysWOW64\notepad.exenotepad43⤵PID:9052
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h43⤵
- Views/modifies file attributes
PID:9068
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h43⤵PID:9076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9004 -s 143643⤵
- Program crash
PID:8144
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"43⤵PID:6612
-
C:\Windows\SysWOW64\notepad.exenotepad44⤵PID:2316
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h44⤵
- Sets file to hidden
PID:8228
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h44⤵PID:8236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6612 -s 143644⤵
- Program crash
PID:8448
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"44⤵PID:8480
-
C:\Windows\SysWOW64\notepad.exenotepad45⤵PID:8248
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h45⤵
- Views/modifies file attributes
PID:8244
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h45⤵
- Views/modifies file attributes
PID:8588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8480 -s 143645⤵
- Program crash
PID:8536
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"45⤵PID:8524
-
C:\Windows\SysWOW64\notepad.exenotepad46⤵PID:8968
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h46⤵PID:8904
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h46⤵
- Views/modifies file attributes
PID:8988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8524 -s 144046⤵
- Program crash
PID:8196
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"46⤵PID:8144
-
C:\Windows\SysWOW64\notepad.exenotepad47⤵PID:7756
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h47⤵PID:8080
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h47⤵
- Sets file to hidden
PID:8352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8144 -s 129247⤵
- Program crash
PID:8212
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"47⤵PID:8728
-
C:\Windows\SysWOW64\notepad.exenotepad48⤵PID:8720
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h48⤵
- Views/modifies file attributes
PID:8724
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h48⤵
- Sets file to hidden
PID:8684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8728 -s 142448⤵
- Program crash
PID:9208
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"48⤵PID:9136
-
C:\Windows\SysWOW64\notepad.exenotepad49⤵PID:8204
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h49⤵
- Views/modifies file attributes
PID:9140
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h49⤵PID:9000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9136 -s 130049⤵
- Program crash
PID:8372
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"49⤵PID:8076
-
C:\Windows\SysWOW64\notepad.exenotepad50⤵PID:7420
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h50⤵PID:8236
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h50⤵
- Views/modifies file attributes
PID:8472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8076 -s 133250⤵
- Program crash
PID:4216
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"50⤵PID:9208
-
C:\Windows\SysWOW64\notepad.exenotepad51⤵PID:8988
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h51⤵PID:9212
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h51⤵
- Sets file to hidden
PID:8220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9208 -s 142851⤵
- Program crash
PID:9104
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"51⤵PID:8440
-
C:\Windows\SysWOW64\notepad.exenotepad52⤵PID:9120
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h52⤵
- Views/modifies file attributes
PID:9108
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h52⤵
- Sets file to hidden
PID:8312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8440 -s 142852⤵
- Program crash
PID:8148
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"52⤵PID:9212
-
C:\Windows\SysWOW64\notepad.exenotepad53⤵PID:8996
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h53⤵
- Views/modifies file attributes
PID:9076
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h53⤵PID:8196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9212 -s 141653⤵
- Program crash
PID:7704
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"53⤵PID:9000
-
C:\Windows\SysWOW64\notepad.exenotepad54⤵PID:8316
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h54⤵PID:8372
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h54⤵
- Views/modifies file attributes
PID:8952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9000 -s 142454⤵
- Program crash
PID:824
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"54⤵PID:8304
-
C:\Windows\SysWOW64\notepad.exenotepad55⤵PID:8904
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h55⤵PID:8992
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h55⤵PID:9188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8304 -s 142055⤵
- Program crash
PID:9164
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"55⤵PID:9240
-
C:\Windows\SysWOW64\notepad.exenotepad56⤵PID:9288
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h56⤵PID:9304
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h56⤵
- Sets file to hidden
PID:9312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9240 -s 142056⤵
- Program crash
PID:9476
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"56⤵PID:9508
-
C:\Windows\SysWOW64\notepad.exenotepad57⤵PID:9556
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h57⤵PID:9572
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h57⤵
- Sets file to hidden
PID:9580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9508 -s 143657⤵
- Program crash
PID:9736
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"57⤵PID:9764
-
C:\Windows\SysWOW64\notepad.exenotepad58⤵PID:9812
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h58⤵PID:9828
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h58⤵
- Sets file to hidden
PID:9836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9764 -s 142858⤵
- Program crash
PID:9992
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"58⤵PID:10024
-
C:\Windows\SysWOW64\notepad.exenotepad59⤵PID:10072
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h59⤵
- Sets file to hidden
PID:10088
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h59⤵PID:10096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10024 -s 142859⤵
- Program crash
PID:9220
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"59⤵PID:8172
-
C:\Windows\SysWOW64\notepad.exenotepad60⤵PID:9236
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h60⤵
- Sets file to hidden
- Views/modifies file attributes
PID:8348
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h60⤵
- Sets file to hidden
PID:7180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8172 -s 142860⤵PID:9460
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"60⤵PID:9372
-
C:\Windows\SysWOW64\notepad.exenotepad61⤵PID:9568
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h61⤵PID:9708
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h61⤵PID:9700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9372 -s 143261⤵PID:9540
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"61⤵PID:9856
-
C:\Windows\SysWOW64\notepad.exenotepad62⤵PID:10008
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h62⤵PID:9924
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h62⤵
- Views/modifies file attributes
PID:9852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9856 -s 143662⤵PID:10220
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"62⤵PID:10144
-
C:\Windows\SysWOW64\notepad.exenotepad63⤵PID:10136
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h63⤵
- Sets file to hidden
PID:8992
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h63⤵
- Sets file to hidden
PID:8276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10144 -s 142463⤵PID:9448
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"63⤵PID:9496
-
C:\Windows\SysWOW64\notepad.exenotepad64⤵PID:8156
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h64⤵PID:9188
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h64⤵
- Sets file to hidden
- Views/modifies file attributes
PID:9264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9496 -s 141664⤵PID:9624
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"64⤵PID:9596
-
C:\Windows\SysWOW64\notepad.exenotepad65⤵PID:10236
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h65⤵PID:9852
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h65⤵
- Views/modifies file attributes
PID:9808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9596 -s 144865⤵PID:10056
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"65⤵PID:9232
-
C:\Windows\SysWOW64\notepad.exenotepad66⤵PID:10024
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h66⤵PID:9444
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h66⤵PID:8784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9232 -s 143666⤵PID:9744
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"66⤵PID:9512
-
C:\Windows\SysWOW64\notepad.exenotepad67⤵PID:8244
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h67⤵PID:9580
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h67⤵PID:9416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9512 -s 143267⤵PID:9900
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"67⤵PID:9368
-
C:\Windows\SysWOW64\notepad.exenotepad68⤵PID:10184
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h68⤵PID:9648
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h68⤵
- Views/modifies file attributes
PID:9668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9368 -s 143268⤵PID:9388
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"68⤵PID:9688
-
C:\Windows\SysWOW64\notepad.exenotepad69⤵PID:9224
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h69⤵PID:9576
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h69⤵
- Sets file to hidden
PID:10164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9688 -s 143269⤵PID:9484
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"69⤵PID:9628
-
C:\Windows\SysWOW64\notepad.exenotepad70⤵PID:10228
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h70⤵
- Views/modifies file attributes
PID:7152
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h70⤵
- Sets file to hidden
- Views/modifies file attributes
PID:6384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9628 -s 142870⤵PID:9828
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"70⤵PID:9908
-
C:\Windows\SysWOW64\notepad.exenotepad71⤵PID:7156
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h71⤵
- Sets file to hidden
- Views/modifies file attributes
PID:9804
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h71⤵
- Sets file to hidden
PID:5952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9908 -s 142471⤵PID:9596
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"71⤵PID:9856
-
C:\Windows\SysWOW64\notepad.exenotepad72⤵PID:9644
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h72⤵
- Sets file to hidden
PID:10164
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h72⤵
- Sets file to hidden
- Views/modifies file attributes
PID:6940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9856 -s 143272⤵PID:10284
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"72⤵PID:10328
-
C:\Windows\SysWOW64\notepad.exenotepad73⤵PID:10376
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h73⤵PID:10392
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h73⤵PID:10400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10328 -s 143273⤵PID:10568
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"73⤵PID:10608
-
C:\Windows\SysWOW64\notepad.exenotepad74⤵PID:10656
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h74⤵PID:10672
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h74⤵
- Sets file to hidden
PID:10680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10608 -s 142874⤵PID:10832
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"74⤵PID:10864
-
C:\Windows\SysWOW64\notepad.exenotepad75⤵PID:10924
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h75⤵PID:10940
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h75⤵PID:10948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10864 -s 142875⤵PID:11080
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"75⤵PID:11256
-
C:\Windows\SysWOW64\notepad.exenotepad76⤵PID:9648
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h76⤵PID:9260
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h76⤵PID:5160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11256 -s 143276⤵PID:10520
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"76⤵PID:10692
-
C:\Windows\SysWOW64\notepad.exenotepad77⤵PID:10708
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h77⤵PID:10884
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h77⤵
- Sets file to hidden
PID:10760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10692 -s 142877⤵PID:11004
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"77⤵PID:1480
-
C:\Windows\SysWOW64\notepad.exenotepad78⤵PID:3328
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h78⤵PID:10940
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h78⤵
- Sets file to hidden
PID:1216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 143278⤵PID:3020
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"78⤵PID:10608
-
C:\Windows\SysWOW64\notepad.exenotepad79⤵PID:5592
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h79⤵
- Views/modifies file attributes
PID:4628
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h79⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10608 -s 143279⤵PID:9000
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"79⤵PID:1320
-
C:\Windows\SysWOW64\notepad.exenotepad80⤵PID:11084
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h80⤵
- Sets file to hidden
PID:5716
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h80⤵PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 143280⤵PID:4668
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"80⤵PID:5608
-
C:\Windows\SysWOW64\notepad.exenotepad81⤵PID:1932
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h81⤵
- Views/modifies file attributes
PID:10560
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h81⤵PID:10848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 142481⤵PID:1108
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"81⤵PID:1276
-
C:\Windows\SysWOW64\notepad.exenotepad82⤵PID:540
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h82⤵
- Views/modifies file attributes
PID:384
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h82⤵PID:5396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 143282⤵PID:3564
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"82⤵PID:4312
-
C:\Windows\SysWOW64\notepad.exenotepad83⤵PID:4144
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h83⤵
- Views/modifies file attributes
PID:10864
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h83⤵
- Sets file to hidden
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 143283⤵PID:4120
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"83⤵PID:4768
-
C:\Windows\SysWOW64\notepad.exenotepad84⤵PID:1492
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h84⤵PID:5380
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h84⤵PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 142084⤵PID:1292
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"84⤵PID:10556
-
C:\Windows\SysWOW64\notepad.exenotepad85⤵PID:10748
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h85⤵PID:5496
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h85⤵
- Views/modifies file attributes
PID:10692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10556 -s 144085⤵PID:11100
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"85⤵PID:2756
-
C:\Windows\SysWOW64\notepad.exenotepad86⤵PID:5464
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h86⤵PID:2476
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h86⤵
- Views/modifies file attributes
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 144886⤵PID:764
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"86⤵PID:116
-
C:\Windows\SysWOW64\notepad.exenotepad87⤵PID:1844
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h87⤵
- Sets file to hidden
PID:4960
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h87⤵PID:7124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 145287⤵PID:4236
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"87⤵PID:3536
-
C:\Windows\SysWOW64\notepad.exenotepad88⤵PID:4296
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h88⤵PID:3112
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h88⤵
- Views/modifies file attributes
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 144488⤵PID:4492
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"88⤵PID:2604
-
C:\Windows\SysWOW64\notepad.exenotepad89⤵PID:1128
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h89⤵
- Views/modifies file attributes
PID:3572
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h89⤵
- Sets file to hidden
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 143289⤵PID:1236
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"89⤵PID:8116
-
C:\Windows\SysWOW64\notepad.exenotepad90⤵PID:2328
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h90⤵PID:10128
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h90⤵
- Views/modifies file attributes
PID:392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8116 -s 143690⤵PID:5808
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"90⤵PID:940
-
C:\Windows\SysWOW64\notepad.exenotepad91⤵PID:6012
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h91⤵
- Sets file to hidden
PID:8008
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h91⤵
- Views/modifies file attributes
PID:10176 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV192⤵PID:568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 142891⤵PID:4644
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"91⤵PID:8176
-
C:\Windows\SysWOW64\notepad.exenotepad92⤵PID:1864
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h92⤵PID:7712
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h92⤵
- Sets file to hidden
PID:6884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8176 -s 144092⤵PID:2520
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"92⤵PID:9200
-
C:\Windows\SysWOW64\notepad.exenotepad93⤵PID:3500
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h93⤵
- Views/modifies file attributes
PID:6488
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h93⤵PID:8068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 141693⤵PID:1308
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"93⤵PID:1892
-
C:\Windows\SysWOW64\notepad.exenotepad94⤵PID:5772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 8095⤵PID:1592
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h94⤵PID:10452
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h94⤵PID:2752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 142894⤵PID:7312
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"94⤵PID:10864
-
C:\Windows\SysWOW64\notepad.exenotepad95⤵PID:4604
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h95⤵
- Sets file to hidden
PID:10608
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h95⤵PID:6316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10864 -s 143695⤵PID:3536
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"95⤵PID:10272
-
C:\Windows\SysWOW64\notepad.exenotepad96⤵PID:10588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10588 -s 7697⤵PID:4944
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h96⤵PID:10168
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h96⤵
- Sets file to hidden
PID:5624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10272 -s 142096⤵PID:9956
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"96⤵PID:1292
-
C:\Windows\SysWOW64\notepad.exenotepad97⤵PID:7396
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h97⤵
- Sets file to hidden
PID:11004
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h97⤵
- Sets file to hidden
PID:7460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 142897⤵PID:3556
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"97⤵PID:8592
-
C:\Windows\SysWOW64\notepad.exenotepad98⤵PID:10736
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h98⤵PID:5964
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h98⤵PID:10176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8592 -s 110098⤵PID:2132
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"98⤵PID:12356
-
C:\Windows\SysWOW64\notepad.exenotepad99⤵PID:1976
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h99⤵
- Sets file to hidden
PID:9620
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h99⤵
- Views/modifies file attributes
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12356 -s 146499⤵PID:13496
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"99⤵PID:18524
-
C:\Windows\SysWOW64\notepad.exenotepad100⤵PID:29716
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h100⤵
- Views/modifies file attributes
PID:29732
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h100⤵
- Sets file to hidden
PID:29740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18524 -s 1432100⤵PID:22660
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"100⤵PID:30544
-
C:\Windows\SysWOW64\notepad.exenotepad101⤵PID:31944
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h101⤵
- Sets file to hidden
- Views/modifies file attributes
PID:31960
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h101⤵PID:31968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 30544 -s 1436101⤵PID:35120
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"101⤵PID:23264
-
C:\Windows\SysWOW64\notepad.exenotepad102⤵PID:48616
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h102⤵
- Views/modifies file attributes
PID:15228
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h102⤵PID:48628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 23264 -s 1420102⤵PID:13960
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"102⤵PID:19284
-
C:\Windows\SysWOW64\notepad.exenotepad103⤵PID:31132
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h103⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4676
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h103⤵PID:12760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 19284 -s 1420103⤵PID:44112
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"103⤵PID:24880
-
C:\Windows\SysWOW64\notepad.exenotepad104⤵PID:25852
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h104⤵
- Views/modifies file attributes
PID:7292
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\Windupdt" +s +h104⤵
- Views/modifies file attributes
PID:18004
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe103⤵PID:24672
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe102⤵PID:24748
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe101⤵PID:23248
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe100⤵PID:30552
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe99⤵PID:18516
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe98⤵PID:12752
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe97⤵PID:11044
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe96⤵PID:6508
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe95⤵PID:6940
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe94⤵PID:4656
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe93⤵PID:2984
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe92⤵PID:10348
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe91⤵PID:2708
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe90⤵PID:1760
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe89⤵PID:4456
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe88⤵PID:4408
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe87⤵PID:5372
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe86⤵PID:1528
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe85⤵PID:1456
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe84⤵PID:11056
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe83⤵PID:828
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe82⤵PID:10464
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe81⤵PID:4876
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe80⤵PID:3600
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe79⤵PID:5272
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe78⤵PID:11068
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe77⤵PID:1776
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe76⤵PID:10776
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe75⤵PID:6620
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe74⤵PID:10872
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe73⤵PID:10616
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe72⤵PID:10336
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe71⤵PID:6020
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe70⤵PID:9540
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe69⤵PID:9496
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe68⤵PID:9764
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe67⤵PID:9488
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe66⤵PID:9380
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe65⤵PID:9420
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe64⤵PID:9244
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe63⤵PID:9476
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe62⤵PID:8340
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe61⤵PID:9508
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe60⤵PID:9528
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe59⤵PID:9212
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe58⤵PID:10032
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe57⤵PID:9772
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe56⤵PID:9516
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe55⤵PID:9248
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe54⤵PID:8440
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe53⤵PID:7172
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe52⤵PID:8220
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe51⤵PID:9028
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe50⤵PID:8536
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe49⤵PID:8368
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe48⤵PID:9088
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe47⤵PID:8732
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe46⤵PID:9124
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe45⤵PID:8816
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe44⤵PID:8492
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe43⤵PID:8208
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe42⤵PID:9012
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe41⤵PID:8760
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe40⤵PID:8508
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe39⤵PID:8252
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe38⤵PID:7680
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe37⤵PID:7540
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe36⤵PID:8160
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe35⤵PID:7768
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe34⤵PID:7764
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe33⤵PID:6804
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe32⤵PID:7992
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe31⤵PID:7728
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe30⤵PID:7264
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe29⤵PID:7908
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe28⤵PID:7428
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe27⤵PID:6156
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe26⤵PID:6152
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe25⤵PID:6680
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe24⤵PID:6392
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe23⤵PID:6360
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe22⤵PID:6656
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe21⤵PID:6380
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe20⤵PID:7012
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe19⤵PID:6696
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe18⤵PID:6476
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe17⤵PID:6148
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe16⤵PID:6872
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe15⤵PID:6552
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe14⤵PID:6236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6236 -s 44415⤵
- Program crash
PID:6376
-
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe13⤵PID:4536
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe12⤵PID:1756
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe11⤵PID:2672
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe10⤵PID:5724
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe9⤵PID:2656
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe8⤵PID:5776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5776 -s 1489⤵
- Program crash
PID:3192
-
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe7⤵
- System Location Discovery: System Language Discovery
PID:4080
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe6⤵
- System Location Discovery: System Language Discovery
PID:5872
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe5⤵PID:3532
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe4⤵
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 4445⤵
- Program crash
PID:2784
-
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe3⤵PID:2288
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe2⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4708 -ip 47081⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2300 -ip 23001⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 724 -ip 7241⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1084 -ip 10841⤵PID:6104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2820 -ip 28201⤵PID:5300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4996 -ip 49961⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3468 -ip 34681⤵PID:6000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 568 -ip 5681⤵PID:5664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4868 -ip 48681⤵PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5776 -ip 57761⤵PID:5584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5648 -ip 56481⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 232 -p 188 -ip 1881⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1056 -ip 10561⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3012 -ip 30121⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2724 -ip 27241⤵PID:644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2848 -ip 28481⤵PID:6164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 6236 -ip 62361⤵PID:6272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 6228 -ip 62281⤵PID:6480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 6544 -ip 65441⤵PID:6752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6864 -ip 68641⤵PID:7056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 6156 -ip 61561⤵PID:6500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 6492 -ip 64921⤵PID:6396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 6624 -ip 66241⤵PID:6240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 6924 -ip 69241⤵PID:6204
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\CrimsonRAT.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\CrimsonRAT.exe"1⤵PID:2644
-
C:\ProgramData\Hdlharas\dlrarhsiva.exe"C:\ProgramData\Hdlharas\dlrarhsiva.exe"2⤵PID:6028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 6152 -ip 61521⤵PID:6508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3980 -ip 39801⤵PID:6356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6852 -ip 68521⤵PID:5636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 6308 -ip 63081⤵PID:6688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3524 -ip 35241⤵PID:6156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 244 -p 6988 -ip 69881⤵PID:6308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 6528 -ip 65281⤵PID:6372
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\NetWire.doc" /o ""1⤵PID:7128
-
C:\Windows\SYSTEM32\runonce.exerunonce.exe2⤵PID:37992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 6612 -ip 66121⤵PID:6664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 7420 -ip 74201⤵PID:7636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 7900 -ip 79001⤵PID:8136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 6308 -ip 63081⤵PID:7680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 7724 -ip 77241⤵PID:7720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 244 -p 7420 -ip 74201⤵PID:7400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 7656 -ip 76561⤵PID:7876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 8144 -ip 81441⤵PID:7440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 7532 -ip 75321⤵PID:7640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 7336 -ip 73361⤵PID:6372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 8164 -ip 81641⤵PID:7448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 7336 -ip 73361⤵PID:8164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 8244 -ip 82441⤵PID:8436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 8500 -ip 85001⤵PID:8704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 8752 -ip 87521⤵PID:8944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 9004 -ip 90041⤵PID:9196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 6612 -ip 66121⤵PID:8384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 8480 -ip 84801⤵PID:8736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 244 -p 8524 -ip 85241⤵PID:9088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 8144 -ip 81441⤵PID:7292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 8728 -ip 87281⤵PID:8480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 9136 -ip 91361⤵PID:7856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 8076 -ip 80761⤵PID:8716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 9208 -ip 92081⤵PID:8488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 8440 -ip 84401⤵PID:8352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 9212 -ip 92121⤵PID:8572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 9000 -ip 90001⤵PID:8080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 244 -p 8304 -ip 83041⤵PID:8948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 9240 -ip 92401⤵PID:9440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 9508 -ip 95081⤵PID:9700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 9764 -ip 97641⤵PID:9960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 10024 -ip 100241⤵PID:10224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 8172 -ip 81721⤵PID:9420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 9372 -ip 93721⤵PID:9648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 9856 -ip 98561⤵PID:10084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 10144 -ip 101441⤵PID:9388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 9496 -ip 94961⤵PID:9584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 9596 -ip 95961⤵PID:9992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 9232 -ip 92321⤵PID:9188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 9512 -ip 95121⤵PID:9856
-
C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\RevengeRAT.exe"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\RevengeRAT.exe"1⤵PID:10168
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵PID:8948
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵PID:2328
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qkpq9ss8.cmdline"3⤵PID:5796
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4175.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc75A2F5F3B1A94AAE9F80E2672D2B9CF.TMP"4⤵PID:3756
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wgxktmce.cmdline"3⤵PID:4056
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES44FF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF25D327B40634A50A092D110BFA45A4C.TMP"4⤵PID:3796
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\z-ywj_pi.cmdline"3⤵PID:5012
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES49A2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD92C7F85BC76427785FAD362CD1706E.TMP"4⤵PID:4636
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\y-bf14ay.cmdline"3⤵PID:3440
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4C52.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5ADF36188A6A41DC9D32515E76C837B8.TMP"4⤵PID:2560
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rljzupey.cmdline"3⤵PID:708
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4F8E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc347B379F6D8245A0AB1F8A351359672.TMP"4⤵PID:9688
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\w8fmothb.cmdline"3⤵PID:4628
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5328.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc112B74606E35413C926C865C49812ABC.TMP"4⤵PID:10572
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"3⤵PID:5104
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"4⤵PID:7060
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"5⤵PID:1336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:34764
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qn6_fina.cmdline"5⤵PID:24812
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES40C4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDF94A2D2E50448F6A1351BB0466A475.TMP"6⤵PID:36220
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\361a6rg3.cmdline"5⤵PID:28332
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4A3A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc51406828748C40D19B637EF5A597AFEC.TMP"6⤵PID:20720
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zau7i_5s.cmdline"5⤵PID:11752
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES59EA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD77B46EA750746C38FFEA41D8E355.TMP"6⤵PID:49176
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zpa_pjxu.cmdline"5⤵PID:16284
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES732E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF61E3425559D4543BF1621BC3C51DC3.TMP"6⤵PID:40628
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lxbtk-y3.cmdline"5⤵PID:40092
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7B2D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc137011714C9F42D89FF149BC2C2753D4.TMP"6⤵PID:13472
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\9wyxa2pa.cmdline"5⤵PID:49480
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 9368 -ip 93681⤵PID:9552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 9688 -ip 96881⤵PID:9264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 9628 -ip 96281⤵PID:7156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 9908 -ip 99081⤵PID:9856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 9856 -ip 98561⤵PID:10256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 10328 -ip 103281⤵PID:10532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 10608 -ip 106081⤵PID:10816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 10864 -ip 108641⤵PID:11056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 11256 -ip 112561⤵PID:10564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 244 -p 10692 -ip 106921⤵PID:11084
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵PID:10508
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:10476
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1480 -ip 14801⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 10608 -ip 106081⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1320 -ip 13201⤵PID:5232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 5608 -ip 56081⤵PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 1276 -ip 12761⤵PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4312 -ip 43121⤵PID:9000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4768 -ip 47681⤵PID:656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 10556 -ip 105561⤵PID:5796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2756 -ip 27561⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 116 -ip 1161⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 3536 -ip 35361⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2604 -ip 26041⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 8116 -ip 81161⤵PID:10328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 940 -ip 9401⤵PID:5644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 8176 -ip 81761⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 804 -p 9200 -ip 92001⤵PID:8788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 5772 -ip 57721⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 1892 -ip 18921⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 10864 -ip 108641⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 10588 -ip 105881⤵PID:5900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 10272 -ip 102721⤵PID:5796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 1292 -ip 12921⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 804 -p 8592 -ip 85921⤵PID:7356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 12356 -ip 123561⤵PID:11336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 18524 -ip 185241⤵PID:5396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 30544 -ip 305441⤵PID:45952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 23264 -ip 232641⤵PID:28828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 19284 -ip 192841⤵PID:24864
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
5Discovery
Browser Information Discovery
1Query Registry
12System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
5Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.195.43\MicrosoftEdgeUpdateSetup_X86_1.3.195.43.exe
Filesize1.6MB
MD583f7907f5d4dc316bd1f0f659bb73d52
SHA16fc1ac577f127d231b2a6bf5630e852be5192cf2
SHA256dac76ce6445baeae894875c114c76f95507539cb32a581f152b6f4ed4ff43819
SHA512a57059ef5d66d3c5260c725cae02012cf763268bd060fa6bc3064aedff9275d5d1628ff8138261f474136ab11724e9f951a5fdd3759f91476336903eb3b53224
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\SETUP.EX_
Filesize2.6MB
MD5c776c31bcd5a0199543741c01578a2ca
SHA17f7fca2227571040f575d9e94de677a5009478b0
SHA2562e1420d7fc7d719b2b135ebb7c98114b4994cb7a55363051eea753f08e97bf3c
SHA512e0759afa922cfaa4c7f2206b7b19b648064ccd9088af7a2fd3ca956c4fb80d5fc720b6d8302c5ec39d4e44b65a15926337c15be68eaff509f425b8f388ff5283
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{908AD461-1762-45D7-9EF9-42B64C58E8AD}\EDGEMITMP_06452.tmp\setup.exe
Filesize6.6MB
MD54c7718620e1040338dc7b6c62c16eeef
SHA1aee8016c2ccdc8ac24fd66c4e53556ccc7f260ad
SHA2567b1b38c6df6fc88d42a3e89da478803bcf3ad49f771b86edc13e4da247097747
SHA5129ffd144658f2e9015d4c0a622618a1aa07ae7f2959d63b97b0817426d43ca2c2f16d7271844db8ea27b691df53922e135cc8a94fdf1706057169e9d5887fb331
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
Filesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
Filesize
28KB
MD5567aec2d42d02675eb515bbd852be7db
SHA166079ae8ac619ff34e3ddb5fb0823b1790ba7b37
SHA256a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c
SHA5123a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3
-
Filesize
24KB
MD5f6c1324070b6c4e2a8f8921652bfbdfa
SHA1988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf
SHA256986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717
SHA51263092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100
-
Filesize
26KB
MD5570efe7aa117a1f98c7a682f8112cb6d
SHA1536e7c49e24e9aa068a021a8f258e3e4e69fa64f
SHA256e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01
SHA5125e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8
-
Filesize
28KB
MD5a8d3210e34bf6f63a35590245c16bc1b
SHA1f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693
SHA2563b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766
SHA5126e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a
-
Filesize
29KB
MD57937c407ebe21170daf0975779f1aa49
SHA14c2a40e76209abd2492dfaaf65ef24de72291346
SHA2565ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9
SHA5128670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7
-
Filesize
29KB
MD58375b1b756b2a74a12def575351e6bbd
SHA1802ec096425dc1cab723d4cf2fd1a868315d3727
SHA256a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105
SHA512aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19
-
Filesize
29KB
MD5a94cf5e8b1708a43393263a33e739edd
SHA11068868bdc271a52aaae6f749028ed3170b09cce
SHA2565b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c
SHA512920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7
-
Filesize
29KB
MD57dc58c4e27eaf84ae9984cff2cc16235
SHA13f53499ddc487658932a8c2bcf562ba32afd3bda
SHA256e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98
SHA512bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc
-
Filesize
28KB
MD5e338dccaa43962697db9f67e0265a3fc
SHA14c6c327efc12d21c4299df7b97bf2c45840e0d83
SHA25699b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04
SHA512e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9
-
Filesize
29KB
MD52929e8d496d95739f207b9f59b13f925
SHA17c1c574194d9e31ca91e2a21a5c671e5e95c734c
SHA2562726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df
SHA512ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957
-
Filesize
30KB
MD539551d8d284c108a17dc5f74a7084bb5
SHA16e43fc5cec4b4b0d44f3b45253c5e0b032e8e884
SHA2568dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07
SHA5126fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2
-
Filesize
28KB
MD516c84ad1222284f40968a851f541d6bb
SHA1bc26d50e15ccaed6a5fbe801943117269b3b8e6b
SHA256e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b
SHA512d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e
-
Filesize
28KB
MD534d991980016595b803d212dc356d765
SHA1e3a35df6488c3463c2a7adf89029e1dd8308f816
SHA256252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e
SHA5128a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed
-
Filesize
28KB
MD5d34380d302b16eab40d5b63cfb4ed0fe
SHA11d3047119e353a55dc215666f2b7b69f0ede775b
SHA256fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f
SHA51245ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538
-
Filesize
30KB
MD5aab01f0d7bdc51b190f27ce58701c1da
SHA11a21aabab0875651efd974100a81cda52c462997
SHA256061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c
SHA5125edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e
-
Filesize
30KB
MD5ac275b6e825c3bd87d96b52eac36c0f6
SHA129e537d81f5d997285b62cd2efea088c3284d18f
SHA256223d2db0bc2cc82bda04a0a2cd2b7f6cb589e2fa5c0471a2d5eb04d2ffcfcfa0
SHA512bba581412c4297c4daf245550a2656cdc2923f77158b171e0eacf6e933c174eac84580864813cf6d75d73d1a58e0caf46170aee3cee9d84dc468379252b16679
-
Filesize
27KB
MD5d749e093f263244d276b6ffcf4ef4b42
SHA169f024c769632cdbb019943552bac5281d4cbe05
SHA256fd90699e7f29b6028a2e8e6f3ae82d26cdc6942bd39c4f07b221d87c5dbbfe1e
SHA51248d51b006ce0cd903154fa03d17e76591db739c4bfb64243725d21d4aa17db57a852077be00b9a51815d09664d18f9e6ad61d9bc41b3d013ed24aaec8f477ad9
-
Filesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
Filesize
29KB
MD528fefc59008ef0325682a0611f8dba70
SHA1f528803c731c11d8d92c5660cb4125c26bb75265
SHA25655a69ce2d6fc4109d16172ba6d9edb59dbadbc8af6746cc71dc4045aa549022d
SHA5122ec71244303beac7d5ce0905001fe5b0fb996ad1d1c35e63eecd4d9b87751f0633a281554b3f0aa02ee44b8ceaad85a671ef6c34589055797912324e48cc23ed
-
Filesize
28KB
MD59db7f66f9dc417ebba021bc45af5d34b
SHA16815318b05019f521d65f6046cf340ad88e40971
SHA256e652159a75cbab76217ecbb4340020f277175838b316b32cf71e18d83da4a819
SHA512943d8fc0d308c5ccd5ab068fc10e799b92465a22841ce700c636e7ae1c12995d99c0a93ab85c1ae27fefce869eabadbeafee0f2f5f010ad3b35fa4f748b54952
-
Filesize
28KB
MD5b78cba3088ecdc571412955742ea560b
SHA1bc04cf9014cec5b9f240235b5ff0f29dbdb22926
SHA256f0a4cfd96c85f2d98a3c9ecfadd41c0c139fdb20470c8004f4c112dd3d69e085
SHA51204c8ab8e62017df63e411a49fb6218c341672f348cb9950b1f0d2b2a48016036f395b4568da70989f038e8e28efea65ddd284dfd490e93b6731d9e3e0e0813cf
-
Filesize
28KB
MD5a7e1f4f482522a647311735699bec186
SHA13b4b4b6e6a5e0c1981c62b6b33a0ca78f82b7bbd
SHA256e5615c838a71b533b26d308509954907bcc0eb4032cdbaa3db621eede5e6bfa4
SHA51222131600bbac8d9c2dab358e244ec85315a1aaebfc0fb62aaa1493c418c8832c3a6fbf24a6f8cf4704fdc4bc10a66c88839a719116b4a3d85264b7ad93c54d57
-
Filesize
27KB
MD5cbe3454843ce2f36201460e316af1404
SHA10883394c28cb60be8276cb690496318fcabea424
SHA256c66c4024847d353e9985eb9b2f060b2d84f12cc77fb6479df5ffc55dbda97e59
SHA512f39e660f3bfab288871d3ec40135c16d31c6eb1a84136e065b54ff306f6f8016a788c713d4d8e46ad62e459f9073d2307a6ed650919b2dd00577bbfd04e5bd73
-
Filesize
28KB
MD5d45f2d476ed78fa3e30f16e11c1c61ea
SHA18c8c5d5f77cd8764c4ca0c389daee89e658dfd5e
SHA256acf42b90190110ccf30bcfb2626dd999a14e42a72a3983928cba98d44f0a72e2
SHA5122a876e0313a03e75b837d43e9c5bb10fcec385fbb0638faa984ee4bb68b485b04d14c59cd4ed561aaa7f746975e459954e276e73fc3f5f4605ae7f333ce85f1b
-
Filesize
29KB
MD57c66526dc65de144f3444556c3dba7b8
SHA16721a1f45ac779e82eecc9a584bcf4bcee365940
SHA256e622823096fc656f63d5a7bbdf3744745ef389c92ec1b804d3b874578e18c89d
SHA512dbc803c593ae0b18fd989fdc5e9e6aee8f16b893ae8d17e9d88436e2cd8cae23d06e32e4c8a8bf67fc5311b6f2a184c4e6795fed6d15b3d766ef5affc8923e2f
-
Filesize
30KB
MD5b534e068001e8729faf212ad3c0da16c
SHA1999fa33c5ea856d305cc359c18ea8e994a83f7a9
SHA256445051ef15c6c872bed6d904169793837e41029a8578eaf81d78a4641ef53511
SHA512e937d2e0f43ade3f4a5e9cdeb6dd8c8ad8b5b50a7b6b779bda727a4fe1ced93abd06720395cc69a274ce3b0f7c6b65e1eba1ecf069db64edb80d007fbb4eedbb
-
Filesize
30KB
MD564c47a66830992f0bdfd05036a290498
SHA188b1b8faa511ee9f4a0e944a0289db48a8680640
SHA256a9b72fcb3bdb5e021b8d23b2de0caeca80ddc50420088b988a5b7503f2d7c961
SHA512426546310c12aeb80d56e6b40973a5f4dffef72e14d1ac79e3f267e4df2a0022b89e08bba8ab2ffa24f90b0c035a009bed3066201e30fe961d84ed854e48f9c5
-
Filesize
28KB
MD53b8a5301c4cf21b439953c97bd3c441c
SHA18a7b48bb3d75279de5f5eb88b5a83437c9a2014a
SHA256abc9822ee193c9a98a21202648a48ecd69b0cb19ff31c9bbf0c79dab5f9609b0
SHA512068166cfdf879caf4e54fe43c5265a692fcaf6a9dcbf151335fd054bbec06260bc5ed489de6d46ca3fc0044bc61fa1468fea85373c6c66349620618ee869383a
-
Filesize
30KB
MD5c90f33303c5bd706776e90c12aefabee
SHA11965550fe34b68ea37a24c8708eef1a0d561fb11
SHA256e3acc61d06942408369c85365ac0d731c5f3c9bc26e3f1e3bb24226d0879ad9c
SHA512b0c1a9d7df57d68e5daf527703f0b6154a2ef72af1a3933bda2804408f6684b5b09b822522193243fd0756f80f13d3ab0647c90d2bed1a57b4a9fea933b0aa9a
-
Filesize
28KB
MD584a1cea9a31be831155aa1e12518e446
SHA1670f4edd4dc8df97af8925f56241375757afb3da
SHA256e4eb716f1041160fd323b0f229b88851e153025d5d79f49b7d6ecb7eb2442c57
SHA5125f1318119102fcee1c828565737ce914493ff86e2a18a94f5ff2b6b394d584ace75c37258d589cce1d5afd8e37d617168a7d7372cfd68dd6a2afcd4577a0bc51
-
Filesize
28KB
MD5f9646357cf6ce93d7ba9cfb3fa362928
SHA1a072cc350ea8ea6d8a01af335691057132b04025
SHA256838ccd8243caa1a5d9e72eb1179ac8ae59d2acb453ed86be01e0722a8e917150
SHA512654c4a5200f20411c56c59dbb30a63bfe2da27781c081e2049b31f0371a31d679e3c9378c7eb9cf0fb9166a3f0fba33a58c3268193119b06f91bebe164a82528
-
Filesize
28KB
MD534cbaeb5ec7984362a3dabe5c14a08ec
SHA1d88ec7ac1997b7355e81226444ec4740b69670d7
SHA256024c5eae16e45abe2237c2a5d868563550ac596f1f7d777e25234c17d9461dd9
SHA512008c8443a3e93c4643a9e8735a1c59c24ba2f7a789606a86da54c921c34cbc0cb11c88594544d8509a8e71b6a287c043b1ffe2d39b90af53b4cde3847d891ba8
-
Filesize
29KB
MD50b475965c311203bf3a592be2f5d5e00
SHA1b5ff1957c0903a93737666dee0920b1043ddaf70
SHA25665915ad11b9457d145795a1e8d151f898ec2dcb8b136967e6592884699867eb0
SHA512bec513125f272c24477b9ddbaa5706d1e1bb958babac46829b28df99fa1dd82f3f1e3c7066dc2fe3e59118c536675a22fc2128de916ca4c478950b9992372007
-
Filesize
29KB
MD5f4976c580ba37fc9079693ebf5234fea
SHA17326d2aa8f6109084728323d44a7fb975fc1ed3f
SHA256b16755fdbcc796ef4eb937759fe2c3518c694f5d186970d55a5a5e5d906cb791
SHA512e43636d8c947e981258e649712ad43f37c1aab01916539b93c082959fb5c6764c9c44979650092202839e812e6f252c6c3eaf66d3d195c1efd39c74c81ad1981
-
Filesize
27KB
MD503d4c35b188204f62fc1c46320e80802
SHA107efb737c8b072f71b3892b807df8c895b20868c
SHA256192585d7f4a8a0cd95e338863c14233cdd8150f9f6f7dd8a405da0670110ee95
SHA5127e67ea953ea58ff43e049ce519ae077eec631325604896479526627d688f2fa3bfc855a55ac23a76b1c9ef8cd75274265b8238423b95a2437be7250db0db31b1
-
Filesize
28KB
MD55664c7a059ceb096d4cdaae6e2b96b8f
SHA1bf0095cd7470bf4d7c9566ba0fd3b75c8b9e57ec
SHA256a3a2947064267d17474c168d3189b0d372e36e53bf0efb9c228d314fc802d98e
SHA512015dcb17b297a0aaad41c7b0b2199187e435855fd3977d16402be774622cc4f6b55d04ba9159a89e26e350c5602928c76dd9386be3974437b41888a0cfdddfa8
-
Filesize
30KB
MD5497ca0a8950ae5c8c31c46eb91819f58
SHA101e7e61c04de64d2df73322c22208a87d6331fc8
SHA256abe2360a585b6671ec3a69d14077b43ae8f9e92b6077b80a147dfe36792bb1b7
SHA512070398af980f193ff90b4afaecb3822534ef3171eca7228bce395af11ca38364bc47cab7df1e71187ef291f90978bdc37a8611d2992b1800cd1de6aa7fda09d9
-
Filesize
25KB
MD545e971cdc476b8ea951613dbd96e8943
SHA18d87b4edfce31dfa4eebdcc319268e81c1e01356
SHA256fd5ba39c8b319c6ba2febf896c6947a0a7bae6aa0b4957bd124d55589f41849d
SHA512f1c9fccf742fa450be249dbbf7e551a426c050ae4af3d2e909f9750068a2bdc801f618eb77a6a82d13421d27949c9f2a9681a44bcb410ccdeec66b24a70f6a9a
-
Filesize
24KB
MD5b507a146eb5de3b02271106218223b93
SHA10f1faddb06d775bcabbe8c7d83840505e094b8d6
SHA2565f4234e2b965656e3d6e127660f52e370dc133632d451ef04975f3b70194b2ed
SHA51254864e9130b91b6fd68b1947968c446f45a582f22714716bfd70b6dc814841fffe939bc2f573a257ec8c62b4ff939643211fb29cabc0c45b78a6cc70eaa3752c
-
Filesize
29KB
MD53bc0d9dd2119a72a1dc705d794dc6507
SHA15c3947e9783b90805d4d3a305dd2d0f2b2e03461
SHA2564449ee24c676e34fea4d151b3a752e8d0e7c82f419884e80da60d4d4c1b0f8cb
SHA5128df01ad484bf2924892129c59317f3da4f79611be2ca29e208114e5ed2cb96a63f753511dc4fe97e281417366246f2fb576cc6ef2618a67803ae7ac01be7b067
-
Filesize
28KB
MD5bcb1c5f3ef6c633e35603eade528c0f2
SHA184fac96d72341dc8238a0aa2b98eb7631b1eaf4e
SHA256fdd6bffdb9eca4542975f3afe3ac68feac190b8963f0a7244b4b8fa6382381d1
SHA512ecd79ddd9f3e6db1d0471132c453c324ab55bdead21de77392f418281bc8a2dd43e9009912896ffa3d55d4d3ef17b0aa847a084369b619eb04a2d2313641d520
-
Filesize
27KB
MD52ea1200fdfb4fcc368cea7d0cdc32bc2
SHA14acb60908e6e974c9fa0f19be94cb295494ee989
SHA2566fd21b94f62ee7474b3c3029590ddf06936105508f9bf3509620c42dc37486c3
SHA512e63b80a5929200c85c7a30a3054bd51eee2f27e603501f105073868690906f4619a27a52e58c90ac2ab5d5c34a4739dfdd2a511574afeb7d0118de88c5544f42
-
Filesize
29KB
MD560dfe673999d07f1a52716c57ba425a8
SHA1019ce650320f90914e83010f77347351ec9958ab
SHA256ef749f70e71424d7f548d5c12283be70a6d6c59cffb1c8101b74f37ecacb64af
SHA51246bfe77a49f14293988863a8e4dd0543202b954b670940d9ad5dc6d2b46e46104d8d6206be08a941f7e02b8ff3e2e2366b7b795d02352cff18971f8d0df5fcdc
-
Filesize
23KB
MD5cf91a1f111762d2bc01f8a002bd9544d
SHA1db2603af55b08538a41c51fc0676bc0ed041d284
SHA256baa9fae4fb8939e0b5fe0c7f393ab1ca40b52534f37bf2158a9a36331a221e75
SHA5129db864dbd194885b46f7bed9875f1e531e48f7644ce4494b8dc482c7516a6f783cd35129d2565b272dc674491a08c844a6da88bf9fa7843fcf89c96b4e0af799
-
Filesize
28KB
MD5ca3465347e57624ee2a5dd2299d4f4cd
SHA1551a151a8d49489c90400e18c34633aa2c2b8a4b
SHA2565b9509a1ae34d89c89c8e657742495037d28cd03e1cd48aef4dfaa7aeebe29f0
SHA512a4bdd458a7628a9f0664e1000512e056718cc924510a21704ff8c69b0b251a5a1c7f6f267d66325cadda1536aaee78440348be128d082112c71732e485ac93f3
-
Filesize
30KB
MD5269e84b82973e7b9ee03a5b2ef475e4d
SHA14021af3bfde8c52040ad4f9390eb29ae2a69104b
SHA256c3fb0cae3dc5cdd86518d60f998c3adec1c0c5804a74ffbb9a346a73d598af07
SHA512db716e2f6527af2dfeba4c22ff00e159d7cc0b482fc126e87b8b3d35b714bb382676066097352b6ebb87c8dfe7f6144e83100f0c9a9990b0d23c810b6c575c21
-
Filesize
27KB
MD5864edbc77831a64a3e3ab972291233bb
SHA1fa1f3eb3320c1b1a329cbe786abecf2a8e625cbe
SHA256aecab1eb46075d1a1432b3e14537f860a2ded49a13ca82f17fac44b40ad2da51
SHA5123d54efd01d6317fb4746b55db2c847a506f594cff055f0db84a72ede02dbe3aa03d8e65ea06c5ae365f44312a26cdbc45ad5f9a0de46d2b9c878aeeb24566b89
-
Filesize
27KB
MD57071c732cf3e4b3144cf07c49d8eb44f
SHA13800bf304b44d9d27ac26bed6ccc899669dc3b4f
SHA2569c75ef5c3f53c643d7bb8c5907a0cba6ca2d1d64e6bea39ce06b4ad5a20454b6
SHA512be3a0942e2af843adeb8e9b6acc7cd8adec956b761f71d8eb0a02835ee5be115ac064fda7088b0813d40ec3a24e7bb77816e9b67ef0cbdce1562c36880b15049
-
Filesize
28KB
MD530849a9c16061b9a46a66e8e7d42ff81
SHA12d0e86535d964acce8912c6bef3cc12346b22a6c
SHA256b8075c09d33cc6b6ff22fdb29ccc3dd319ce867f4b77a1d165f6f8d8cb4977e9
SHA512298ee10ff6cab7ff38d31e3a7826dedeab8e9ccc616eae4ca2e5ec333f42e5c6744650857031d8bf35034bd46c7c01a2646362ffbbef1f421995c73ba999ff0b
-
Filesize
28KB
MD51866ddadd9397dbf01c82c73496b6bff
SHA1b210a9df7d6a5e116fe7a9ff8d455b6cbfb5663b
SHA2569b4bb2ca3366a1935b4869796efc0601f94356b45e8613d28e023dd516f48d17
SHA51276fa5cade101d79d012e00904bf18692f85967ceea0ed7e81da4df65b85afc125a00127d9e06c8c59ffbfd2dcdc88488157b61922960559fa17d13dedca3ee59
-
Filesize
29KB
MD5064035858a1df697913f06c972461901
SHA1b6be99ae8e55207949076955389bc8fec81937fd
SHA2564850260d2cbb4b4ff3490eb90ce55a412268ad699f946b1cd686ddf9f0403bd6
SHA5129459056e919854213117b874e61b526af4ba35c3c3e195b204c5c3e59cc4dfa2b4a45c32551e1de144842844f246f5e0d025cdcc78dbf7265ba5e26e7209cd91
-
Filesize
30KB
MD57e90d4306c5768dfd1160ad9e2168a19
SHA14f7b17843ad226d51cfb0090235b55a29b5a674a
SHA2568ebe88477b1493733140f1fced91903276ec69c7302deed3281054b49573eb3c
SHA512f6d8b538915fa70bfb784ea7e6d4047759d8eecc822e4b76ac9666997a41901c8269a8185f29e5472bcfaa87e4b97483bd544f3fc8f656b60dca71d63b44d291
-
Filesize
7.2MB
MD588eea09427500e5e467be9010c4c5afe
SHA18ff433300eb702e6413262cfa8595cb07d22b06a
SHA256f5aeb7f049e4e44b414d68b06e82a22ec3fe08d58ff2991191ca4d3acd9fdbae
SHA512feb5ea900dd4611932d8ca9a69b8d9449451b15ac225da41d7a7d060fa69ff7c7671f75f6aa37c00720f4bc24c7e19690fda00090f94a7431748de236b583bb2
-
C:\Program Files (x86)\Roblox\Versions\version-ecc9c250281b4c14\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
Filesize1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
Filesize
9.1MB
MD564261d5f3b07671f15b7f10f2f78da3f
SHA1d4f978177394024bb4d0e5b6b972a5f72f830181
SHA25687f51b4632c5fbc351a59a234dfefef506d807f2c173aac23162b85d0d73c2ad
SHA5123a9ff39e6bc7585b0b03f7327652e4c3b766563e8b183c25b6497e30956945add5684f1579862117e44c6bac2802601fc7c4d2a0daa1824f16c4da1fd6c9c91a
-
Filesize
56KB
MD5b635f6f767e485c7e17833411d567712
SHA15a9cbdca7794aae308c44edfa7a1ff5b155e4aa8
SHA2566838286fb88e9e4e68882601a13fa770f1b510a0a86389b6a29070a129bf2e5e
SHA512551ba05bd44e66685f359802b35a8c9775792a12844906b4b53e1a000d56624c6db323754331c9f399072790991c1b256d9114a50fb78111652a1c973d2880af
-
Filesize
82KB
MD5aeb75f623defe2cabc0514d3af270466
SHA148c789b6c48075c2d68d66b2e332252a9637c955
SHA25654eff9cff493357efd452a3797a4473cc699b76db239c22079dc080cf5539b79
SHA5122505417429f2e105a6d68ab9e0484e7d6ee1981047b00d98a52102a6961b4a0d0e2a92e36b0e4633ed93d1f9d06c16995545bab3dbe9e71a9eb3076afe4505e4
-
Filesize
168KB
MD587e4959fefec297ebbf42de79b5c88f6
SHA1eba50d6b266b527025cd624003799bdda9a6bc86
SHA2564f0033e811fe2497b38f0d45df958829d01933ebe7d331079eefc8e38fbeaa61
SHA512232fedec0180e85560a226870a244a22f54ca130ed6d6dc95dc02a1ff85f17da396925c9ff27d522067a30ee3e74a38adff375d8752161ee629df14f39cf6ba9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD56dbe1e7fd0197a431bf9db44e6748b85
SHA1767c533a7e7563c7f9d6510180b69ab6d166228d
SHA25635e3a6c7f2f1fb01123b8fb6c7396153d2309add9dffbb7d8640fd509e89d65a
SHA512ec3a3f0ce664a33c0d489efd9b4189863c1c779657022b7bb756521999cee43d5421112cd044a3c7dd63f655c7424fe8c407ef35f58e1d86bf96f81dea0b556e
-
Filesize
23KB
MD58ca40f5b81972633bd1e301c2f79ebfe
SHA1696550411e8bb10ac5c9ff0e75641021435e799d
SHA256fe39f362337bac94089fa5ea30dc45dd10703bb30225e5ff391b1fdabcddd30a
SHA512e1d0478c51d2f20fc7415c6a638f39e8ce87f537920a645bb0ed81c542d6c87a9878ea517e83aad34aea8b5fe8b4b24f65adb8062dee14a4a28d0cc69d3fb583
-
Filesize
61KB
MD540eb6f2bb30e43e8acfbf58a114d43d0
SHA1d026c223c2afd8c0a70e107d5bf02492471ca2d5
SHA2560c417efa073023a9b5c6f9d2dc195b936c285c28c9d661cab876cc8f7e46287e
SHA51274ef33b15eafc654823ded129136cea497b1cd0779b4f48071263aaa2f21e6c54129cbe5f226243664d767acc110406d72462aeb3cb23e9c4e2b21ab67d9bef4
-
Filesize
76KB
MD539edacace5add10baa65e99b89953ae9
SHA1ab8bd79f2a7c127d7bf089ceaa4b1967502a31f8
SHA25645fa5826d0634a8847c19f0afe97859aaa59d9bbbc09cfb20cee731f5205c0dd
SHA51219173c97e62d0c2ef250d66110a6907d5673a5459d32c5d60a87541e8fb5f15315b1165d00877a2cf18cbbd86fc8a20c22807b80d282841bcdbe246937005522
-
Filesize
61KB
MD58f27dc67509e4026c2ce5d8caa009371
SHA198d5c73dd37105aeb73d69d2a251604fd609612c
SHA25620594aca0f9ccf38a1ec72f6553936f5692925fa4f3126299af0da68186bf50e
SHA512275505adfeeeb6fb97268f0842a14c56262a834fac70c7c8ddd796852922a7da21e5510dadebf96f2b0f0906ad3d068946182bf5d6093d6f3139e7d73dfda8c7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\047DC33263ADB51399FFD73A80E487AE4A0EBC9A
Filesize1.2MB
MD5550105e893e853113a09fbb4d4f635bf
SHA1ecdb0a52655283b10ae76e0b5cf484e202d6ce57
SHA2564aa7bc2c6e3031dabf94fa99e6649e27be256e9611510edca6246d115545e9af
SHA512964488995f0e25a1662eb9e144479e4f6229869b64e445dbb39e0f0bc3273f46930d74172535da3ba7348b707ecf41f7789c3f32e2c0f9a60ff807fe22761d3f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\0F12B3C306654FFF8678017F2FCD90AC13FEB809
Filesize86KB
MD5f05675d81c4e8ebaac5632073bbe5927
SHA1d571ba27e9c854f4498d14d5c0d053fd13470f4c
SHA25639425dc22f9106fdff32cb474591f95b708a18e0ce0f608d7c30a44ca1b7b4f2
SHA512a198fcdf644edcbf36bba5d3a7f9fdda175976800e60f83728de3be1fa5a8e89f8fe9468f570ec6b5c67c1353079f655c60d81c2a079b64839a4a934d1b74c8b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\210094FE2194727DAA201FD79E1905AAFC315528
Filesize49KB
MD5a86fb323a7d08311b8ae052536b951ed
SHA17ca2e8dbbd73692cb5a365187d0c85a087adcd50
SHA256db3cfec43dd2dd3070c4005f5676029c222278269c7eca209015080359024465
SHA5126cdd67a3b306af98d3146fba782325ba62d4b686a123f698db999e2486ae36960c9737c475235ed51d0640bb636be6fe6c0dfc626b3dbc4d1fae2952a080827e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\26BF2B033A1805E2FEFDFA10342D76FE314D04F4
Filesize42KB
MD541d44889b0c88bd6768b89e9cad9d3c0
SHA14a8dab8aa73d62cec5342d4161e30a4f1a07535e
SHA256b0cc4bdbf6029a4b13d1c9ba0fd23ce1260dc5763a10114973da49ba8cc273dc
SHA512e89b56c46be5fc2bdad76c279582b9d2d130487f295bb02d47cfad6dcc18939b3b1d6ea310ed82a830eff5dc879e2b54cf0dad2c3e0ed5bca0b560a60ab50da8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\2B1FEC63CF263C0B09AE9A7B73864F8C086DA30A
Filesize40KB
MD58aacf3767bcb1b833c94531a73e3a7b7
SHA18d249c857745f05a6eb82c2bdd9ce1b0eb1995d4
SHA25666806d58cb2eac2c48cb93e22884214c4eb6ab0cc9cb3cb90c7a2c9ea5e05052
SHA512e361c7a94c5c89372e2d255f9c89a9c8bb78855dca848579da5659800106acc2bf68104007efdde0c2474073185d3345bc2f7567f181d199f4d9a0a3cc8ff1fa
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\2C9F7C365345D332755452A43101FE4AECAD3032
Filesize137KB
MD560319ecadbe5749db4af1022d285d0fe
SHA1d80a3f6049588da95e3ec31e1b996c749ae827ee
SHA256d4d882b41a8b236c3ed74a045ef492aa9c0c1ec43fa53dfa2543b56b408169db
SHA51272f354c0882e0349df9044b4073459ded4c24d512099d6d9bca2ee444da8ee9a2aa2ce073c7df84c3c93a57a408095c51305e06774a9eaab070e5b08ab33acaf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\3BC153A64ACD34EAB1915EE35ABC99E88E1249C0
Filesize172KB
MD5f482f61d4055c396e7810e501c200452
SHA1d8139eb6cb61ac4d04ff444ba22a097b4a7e6a55
SHA25673d2475485186775114300cb6b08c191fd581f9a9409f47b7e196ad68116d8c7
SHA5120a043767dee5b94ab1561f0a9403fb38c597857efb76e8b59fa3be649216cb11d2ce16cef5a346a50d83a80b0ab054efa0c9c32d70144140ef8c133d83fef682
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\4431B4DC7C8A71D8C1D222FB4D3325C952DB0596
Filesize43KB
MD5318955304b5e30d6947887cbd906cf54
SHA12ca4493281ca3b96a01fd669b9699637475e5ec4
SHA2560a75cbd36774ce1b0bc7fea530182de9126a9bbcf0bf7deac3445494936bcd97
SHA51285a50ffaa21895f7f3c8689359ea0ae3d4954277dc7897e6af5add1badd2e4aba86e9facac95619866bcaba6ccdfbae72ce1c623391fd85885adcdab952cf44c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\48A773B8B92BFF039D7CB5A9DA03A6DC953D7D7B
Filesize43KB
MD58a908caedf31a770f82432bb1b2ec367
SHA13c88cdc54b1f247a750f46887c934f835cff0555
SHA25644a6b1d9bbaf3d33f4105f31c22843556d1a9f624e05de745c417eaf9144fe09
SHA512ca7cc9de28f9b9581bd594e0c3484794bfe1ce3b2974410defd6bc132c6fb608f8d9ed230e940e65e965254fffa067698f3db216d32fca1a54e2b6bd93d1f39e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\4E33C2090819C3120498C4900B491A4CC55EBCEE
Filesize111KB
MD541b8843bc6d30b80c6a137de7660a5a7
SHA127b49f06f2e04d3abc999dc84a35715236d8f74c
SHA25649194cc79c574e75ac7954a375714b69a962e44d76a914310de35f0bf5040007
SHA5129d0694269496a4ca531b71fb9113dc2aadebf06fe5d7dd6e4144acdb2bc600b76bdbd5161d0656f9b429a43b95a8b7837f4cbae02a9687e931ebd556ef8e26ab
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\599BC81FBA54704D6EE00B2F21895B7D128857A9
Filesize81KB
MD569b5f42c1841b325fe7c8e609670140f
SHA1ec9b9c898a7dacec7fd2311da86f1c18a16c21ae
SHA25682d8390fe6ed84dbba5cecfe3fb76c57aab4fe62a4c5823053d4e369b6ba1aae
SHA512c40fc497fc05fc7620826e37a3a20a1f7afc808180c11dffbe4baf4268d8d33eb4e2423a2a6e83c48cab49163270bfead2ba30956bc6e9a700a41543168eef8d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\6717BB7EC49265AD1AF08970E4F96122C750DB1D
Filesize49KB
MD5de4144f69886681d267d00bec26f467d
SHA18fff11f4abd2b2491576b5f1f7ff73d4180ced62
SHA2561883f529a69cf5d232a7052f475837b7ba85a5b489b4c90bccdc1411c7f3e444
SHA512839d7f274ff3b07daed327bc55e12759b5fe3ae5fe121a378481c2719c29f4f574c1fa495b01432ee0908e617a1387b171d7602c0749ad1bccd61d634004eca7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\958637EE0B4FA139EE2D60659C1054172C4D3F18
Filesize124KB
MD53265880826c0e0200a600a24ed4d0b40
SHA1bf6f8522c856aed5c82fe1c61ea6b175e0d0b40f
SHA25672527268627e57987734d99351af8cb4e351c0f6763065a802fd3a18e68131e4
SHA51201c5acb0497b838a9df992c42d383d38570803cb499eea6c018860f8b227fdd84474783c572374871f945998b32f721a58c0fb8e45afdd2d1e6ca0d22227cb76
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\9B656BF5140541EED48CD19CEC359A4C310CB51B
Filesize3.9MB
MD502a0eeaa85acdf93d9e73ddf5c643beb
SHA157080d7e7c2e5c4f4e4cd1fb30f8da4fdc337382
SHA2569080c819ce33ed9489054487a8463832ee2f64e6ac99137f8019965390afd4bc
SHA512a7a0ffbe3132b667e938bbd1cee0d72920496245329ea66d93292d45f77a73aa030cfd03784860e91d63ddec168fd4aee2564f05af02f62cc9decde598602c51
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\9FC8C85689D31525EACE26158B83B464F43A027B
Filesize23KB
MD5d4dbb980df5d0637e9adf6dbfe1649a3
SHA1b910b65f5a3517b15846a3b3ceecfe39426108c2
SHA256af27a2355d4a432a10d463d91a934afeb56f704328165224b684c2260d3f6778
SHA51232fc69fce7256f05160ef680b5de06ec37e678e8e1631d85516ab14353f574ae70733341a25795243f77dbb82ccaed3aec8213957c83763beb98e2d86c9754bb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\A98D1716C7100A2B6D871AA1AB85B5943C302727
Filesize101KB
MD541f0007d9b5e6f4c52f58530b4aa412e
SHA1ca898918152e6ff4e1121ee44293e9fe84a49f08
SHA256c7c20d7b68c0bdee40fb3d556c8fb66e5d326d0230eb3220e6a376c3962f9223
SHA51257b2dc9a4b52928f80bf2524142381f1181cc5b2736df9cf9da81b1e1671caa909ee02b39b775457dd21aaa9b314670f95b1811400e1a21e933cc916dc5e51b7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\C18354D7F44353ED364BBF1EE8CA431E41DC485B
Filesize116KB
MD5368b973ae3515ed5f84ae333b26c91ea
SHA18234fce2cbf3ac9437f905d428f46b2eead27b4c
SHA256dfefe6f4905bb61d08137786d96675b2245fb3efd0d33d369f4e1fd04001e349
SHA512d012b663008b8d005239a42e25deae1e79723a0df2ac856e333a95dbff36cc0378fe186a63cd57edc0fb35880a7ac140f82fccdbfbda221a4a319354a46b2d9a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\C7F27F1B728D8DB7CFCCA0B5822E7997A8F337CE
Filesize57KB
MD5210a2b657659d953fe4c23e8507bd254
SHA1a932bb593a6f50fb0ee5b758820406440b7d03f2
SHA256131e3a57071acb33a4f4b4cbddffe360ab6dc7c34f814b5ae4cf2fb7fe0546f8
SHA51296499f3ea6557bdfc03f958ff9cf5725214b83ec863c4d0ad95a361428de57c6a054cd565ab70b3d22c13dba7640ff5b2928efc47d607a8a2dddf3a622f56bce
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\D3997B5E4365FF84BBECDA3D1939508B5A2ED9DD
Filesize223KB
MD50172eae1d7f358114ae3fab75ac1ad6f
SHA147f88b6a8f61d5421ec43f8cc933a46fc53b0cfb
SHA2562ba00ba249749e9f3e151988b18f99bb54973a0ccb03ff669de6d68276cf7afb
SHA512980f053430e25bf25f8bb8e98902f99c049db4ca7ae091237cdbe8264a5433e85e0c10ed7ca999f6bf338c3233b11d266a1a4671d969a020b3faedd0b4db1d36
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\D947845403205EA7F2B4DF066D1698C80C704952
Filesize190KB
MD52836d92a27fb0e2c9ae77b3167b20bd5
SHA1ad3a72b9d19663ee4ab0c0400c5e1bc221258f85
SHA256bdad54628e104eca052a0886bbcc6d2a386caaef92b99b804986e4fe392f7d4e
SHA5120fb405f764c991c0eada6e6fdd59d36d51e36d06e4f43494d2dc065a32239929744a28c9a87d0e61d4d80c6096818550db34bfdd48f93ae5a677fc0f645cac4e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\FDF6B58537ED8B14D054C51FA0C143CD07312930
Filesize2.7MB
MD53e5dfffc2dd5b16ba66e2469a720af30
SHA1da005ff93b28afb491bc5663c95b4372c76f3f2e
SHA256957a66d40c3bdf46db51ef3be5b49d87a0c34b4254cb36c367852396834adc86
SHA512baec9609b099eb55dbbb9439fceb21136d7a33f73b1906d96b3a99ee444d137a3b8d3ab16086a01e6243405581437c1d8a8e671c2ddc847f60431b14a6cc581b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\cache2\entries\FF3662F1AE0CDD011F81F05DB29E32FABC54D84D
Filesize75KB
MD5be763e22e9b64931d15671f1372faf4f
SHA1a6d03de401848506ab312d21c65be70450dec18d
SHA256b5653fd973a8612730a9c13f42a4b88610ba4b23cb6cec4a3176bad1e375c566
SHA512769ecc3d0d2f0af8cac748483baeb2afd95421693644072c739a64186cddf2b948e3d4ba6923c4053c2dda64aae8dd6c5a6d6586b25e61594f4ff4a9823c62fe
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\jumpListCache\ROm13OEayrs+4kJA4YOfK0QZNOlO7eIzbwJn7kJ59Ds=.ico
Filesize25KB
MD56b120367fa9e50d6f91f30601ee58bb3
SHA19a32726e2496f78ef54f91954836b31b9a0faa50
SHA25692c62d192e956e966fd01a0c1f721d241b9b6f256b308a2be06187a7b925f9e0
SHA512c8d55a2c10a2ef484dedded911b8f3c2f5ecb996be6f6f425c5bd4b4f53eb620a2baccd48bac1915a81da9a792971d95ff36c3f216075d93e5fd7a462ecd784f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ys8siqnt.default-release\jumpListCache\bnt1KG_xOk48FKmLyN+84wkiVNP1bIKJKCsp7RzBDqI=.ico
Filesize965B
MD5c9da4495de6ef7289e392f902404b4c8
SHA1aa002e5d746c3ba0366cd90337a038fc01c987c9
SHA25613ec8c9e113de6737a59d45ea5a99f345d6cba07f9a820bb2297121b8094790f
SHA512bb72f0cc815e7b4c44959808b153aad28dbced8d97e50f83ef90229d19ea1c4b3fffff650bf49efe562451fcae0325cdbdffc1a5c4ec5d2c7c70ae9d1a0d8a16
-
Filesize
32B
MD545d02203801ec5cae86ed0a68727b0fa
SHA11b22a6df3fc0ef23c6c5312c937db7c8c0df6703
SHA2565e743f477333066c29c3742cc8f9f64a8cb9c54b71dbc8c69af5025d31f8c121
SHA5128da0bf59066223aab96595c9fbf8532baa34f1f9c2c0dee674d310a82677b6c7d6a1cc0bbaa75262b986d2b805b049ec3a2bfb25a9ae30fe6d02e32660f15e83
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
424B
MD596de64510614cae7ff4c0193751c6b7d
SHA19d493c089dfc3bc8db85a6fafc98ea7fa50da86f
SHA2567e03124337d550e5d9d2955bfa17213f04ffb25e129a79a094c7f6b89d5dd571
SHA51292ca4fed894e4aada2ff2235a49fa1c12c1026837a233846f74ab2b792057f26c8ea611fdaa2d389ebb97d89d077ee9ce15a49fa53d937a5d13abae088cf0180
-
Filesize
462B
MD506f89304f8a1d8c67bbf0c3da00cd283
SHA1de48c5c655e8afbb4c88e1351514a3b7aa55fbc7
SHA256d7b64aa7b54a55009f52aa6863d87d7b7f7890f7a6c22607bf157da37ce26aed
SHA512cc5054e19b104d0a1de55e71514d9c2baf11552d014083db83662de074b4af7e6eb9f0e827f868902308f63bd99e165e5d8c4739e59c437f15edeed5f319fa18
-
Filesize
31KB
MD53cd4b47c44e331bd6484bd5503c828c2
SHA1d6403e89fa99ffbc7fe0af0b93432ab98e0528ef
SHA256a96c5251f8d443bac9a2120913e0a5398a2455b6c58f09361aeb8b2eda23e4e8
SHA5129cb99ea6a20ac1b9c9c64cc6de41e70c3c381e639bbdb723c586df7873575a9d0db5a92d78bfb5fd33dc5611a27121dac742abd4ee1848eef75c918df142c78b
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize13KB
MD5bc7d07b5dac15525d0d8de029ec2e49c
SHA1b33418105fc7df3bd366218183a4367712cd3370
SHA256a5bb16f459afd1455d1d653e0b02b3df3a21b936a9464531181f8388e44b4ff3
SHA5129877b479c66913cab605b84f5765a1861f7146b7039f08ce378ec69e3d0c7ece78e1e827bc63b620041530628a02f1be419d4c214096eabd38a6e10141579dac
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize19KB
MD5d590aa99948499b4648e18f721541779
SHA17df52ecadcacfa29d564f95afd6d71dfb97d80d0
SHA2569e4e42679cc9a5a1d1fcc6f9aad35e9399b1b81c72fac0185db8f7745e27b80a
SHA512d1db32e9643f44c08ff2967c3300e146161cd88e80e8d02750bc4170ee2edffd0d5efae78313e1f31395c9acb8b80a35a9a045e185cb14f4513813c5f44e1c2d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize19KB
MD5728af7c19c7e2ea40f8626c70648d8ef
SHA10327734b0735669b9015bff57f5144f1b397459e
SHA25657407a2fd4219e08b07f9a0ff855ad297f7871f2fdf547696d622191373763e4
SHA5125ae7fb9d2aba9d4420638b44f03f4e9d580bfff8698ed5c4ef2967111af081503f655ad4a6a4304053c1fe1e6c7ba4f7d772938ad7fdacde8b459367852cb06c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize20KB
MD51f860c90fe2a78b03e6866418e7bfcd2
SHA16f88c9a7eb761ec898707937aae8cdf22bf5fb3a
SHA2566beb0f4e2df9d353b772773030bb472d56ee057c46b3c3293af3f4001ad723f9
SHA512f3d06b8757564b1139383d75945a2419cffb74842febb00e5c52a73ac9a4a5c69637f98b872fdd4f688931ef409dc29766aebcb32a014ddac0c81141a4ffd523
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize20KB
MD5f1fd4e48c5abd5cc74d9d6e1280739b2
SHA1cfb53323437c1b2ebd0b41fda917257e21f36b96
SHA2562579f95d6157d43b31dc952d5eae26995f4295e5c2e5ff34c372f330fe66621f
SHA512b7797519b5b226e2fa2153bb3907cf5fad72299493b4dee530d2159c03aff20cec23247a9e9b7fdd56cfb50c5cc40fac9f3473d3cf0be909900b1033ce0bc8a7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize20KB
MD52f61d147df46bc05869d1e35ce91b327
SHA184cb0877c55857be804229b26fff7cdf21fa3baa
SHA256b64b7c5abd6ee93a1c3b215ce1333587cda4f83bacb945c66ab401971fe1c791
SHA51234e2a8a274eb78c2bc3c41d86de363f0af3b646ed0c0774917f0380c79e0732365f4ba18f55dd291e51d38daecac09b0ba89a3a13595264257b69f9105f6a533
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize20KB
MD5ee08aec842e448309ea1c5998c03728d
SHA15d58e2eedbf73862db576aca98b8b30bb46df192
SHA256eda4d1fb323f9b6e3a25acf49a688211ff79eea093cd06e565c70ce1c637927a
SHA51210b3bb878ea20db1a5dd5d1660aef55e759bb4a40363da01f4ca016e280fbc202c6a7c7a2f77ef69701bbad489ebbf6b26d272c170ad3e9b838cc27bed7444fa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD53daee1b13441b4854570a1b10dc7976c
SHA1e22ae15e353bc181efdde6e59bc076f597b9c01e
SHA2568c743f47a0c55ec2874e3eda78ed32a9341e67a493d4a9199ca6a5a6fc1d94bc
SHA512f356fa5449de0e9594304badc8b39f7c7be7c03e8bc551fc64896a9d26c1833e49791a3f7129c546ad1f5450cb05bb7a6982081008109b609571b570b60c3759
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5d7da10c194cd3ffbfa0bde9c7d9a5175
SHA1f193001f65f2a4e9e3ae16e7e25005c8c0674870
SHA256cc2078d8b14b1f98206d5f19886e17a0e470d2e4448764361c35c341127391aa
SHA5129a28861bc5d0c02c70b80bc518a2ea6972752c319dcdccc523ee350b5637e9f010e9746bc8dbc33ba6afbb68a342a700bf991f8cee83996824015dbbc121cc0c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD510dc5609ae230a23523cc78c3091579c
SHA1041170750210365fe6cd1d3cd96ba03107d57c41
SHA2561c955d384515ddfdbd26e3c48cc03e7b6d246e14d2bc5954fd7da7386e7f03f8
SHA51217c48b5c394c3477294ef5e42ddfa6e8d2e4bb225e19c59df340459d0256724a293e5ae73f75c67f4d5727e5ab2602db6d918de847fca2bd45e6540846e9b5c8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5ac9743916bf23cbd5d8d89be75d17e84
SHA1c9ae8c0117b8f5adc4af793348bb45537d4ab316
SHA2560ce1a6c807732203d48bbcc5a9a35aed1056f8d2961b420da1585f1381823357
SHA512a5644e709799039e6cc5d4190138bb4fc4f10284ffacde6dd5e0de03119985bd9e0e151162aef2b42cbaefdf295cf7ee1a71e420ea9cb82ff344e603d1d31a2d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\AlternateServices.bin
Filesize8KB
MD53ee79c10aef61e20c00e37125f2ae5bf
SHA119354d9c4c093100ed00c3425c17efc4c9deec27
SHA25602bac29f66ca81d2305ec7f10e14fbb1372a3afd78eed2de713b523c439e497b
SHA51231abbd61efbad08ac6e54ed37b48ea23d709c1afe8510e0063201e036e764fee8a5d14ce7d53874b7638799bd527838d2939ad3acec9e823367bc7e08003ec7e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\SiteSecurityServiceState.bin
Filesize5KB
MD570a07c2155073cbdd250ff9e2d2ad845
SHA1b66c37a80b9b3980604c6400251bb224040cc9dd
SHA2563ced5e74e10649a45f0b9499a870cc49c6609edd19a670f67063be426faaa124
SHA512c7390ae9e92163a82bf426c44e252199d6d60ed63cd92706b5bc83d364e6ff09fc0d4299ed97bbe709fc75a6c324261108e0d53c63f286fb37e4e671241c2856
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\datareporting\glean\db\data.safe.tmp
Filesize86KB
MD550638560a1ce6a5a507b1c1040177654
SHA145933d320ec9fe32ff780833f2efb30a7104dafd
SHA25640ade77443b80842b5ba1669acd55af3aff4ace1d33de15a7388dad1b0711022
SHA5129fcc8d4885dbe171ee95ca37c69490d300b3b366a9e8d2b57420cff0f7aa381d4216692bef8204327570e763be99139d427f81d22d64f0a66ac54391f8187e22
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\datareporting\glean\db\data.safe.tmp
Filesize96KB
MD5071622e1cd41aa82173f20b03b6dcc38
SHA113db229739e15de5fa80e121a5cf22dd306f879e
SHA256379b968e323cc59cdfcce133dfcff98e6fedd6b62f4d440769f242313e4e29f4
SHA512ece4e563d4864901ddd7b8f5c54a4ec6841db8389afe14b68299da913f2c1b250e971d0fc4a3c5d660b5ca5f621684748ecc10521acce69497f101af80a6c107
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c6d2c30a14e4f1e7c4102a426ce9010a
SHA1f973dcc29a09032cc94f9ba0d54edfd1eac9ba78
SHA2563645ebcdd6129fe23626796afd188ae7a162e8053770a9969463a850b81d1108
SHA51261c91db140498f60e1b236b67ffca79fde2fcad032b353f1c390ff486a23d50ec05d14c39b03c2e20e31c1b3f0dab9080715335aaf72d06167257071255305ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5526706409e612ae3695b6401a8d5c376
SHA1feb15da23da7f33621b202a114731f678d265b26
SHA2561bd44fccc309dfa1859fa77f191209d2ec0711ebf818c0e1f95e49ad4b3f477e
SHA5121299f68035acbad5b95786433d7d9c49208a4eb002e3e19c1c88345d242dc8be381aef28458b3d22f3867a118dc07a075fafce7215811876a87aede6a01afb07
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\datareporting\glean\events\events
Filesize4KB
MD54652b67903536a174c0ce2b6d4b8bafd
SHA1ecb065cd8f790543c74e4f14ae2d24dc9d19d15d
SHA2569f6bef2287554059b141963c31aa04c78a3f93f4edabc8c22a6f2a0d92d1a269
SHA512d08cb893de8e8565e94fad5a4037f2bb2de74e30069bf204a8acc49782fb18ea7dda787271c55ca3d1d67ebd275c016c56bb8fb5a2ddff76a99eb7c2c8d1e91f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\datareporting\glean\pending_pings\4871951b-f04d-491d-92a3-5cfaf3e6d613
Filesize26KB
MD575e14a729768415ddec9852fdffbb464
SHA1b832cc95d5249c1926d931b6c20a417ba887ffbd
SHA256c14011996e079d82129e0676d6210f77bae954b6186965fd21430da35542cf38
SHA512476a0f14ee7e0f3d1dbcaf9fda8f94635dfa8b10ce9e64bd51e146d63735a423d171f1d64bcb8db1af3ba89ce4e64a20cfddc02ebf2902ad17884ad57729b5d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\datareporting\glean\pending_pings\86578631-d19d-4f9f-a484-a7d04b771a28
Filesize671B
MD5717380b3597d1956b0bfd63b1bea6649
SHA1f28fe1b9d0d7f94c32e913518b27049a41f42603
SHA256e969fb290a3b4c3647805a3bf48e0d234d4f1d1712f582ccb756948b88a0f803
SHA5125566f8c16310fc46200763823a2f2768bddc8a8f3fae29d16ab437249d994495c93e9b3202529184154f391103ee4af0bc0020cfa8b5d405f9942af2b3b5e4e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\datareporting\glean\pending_pings\a2b49a16-3412-4517-8657-55bd57e54c23
Filesize982B
MD56dc6de119728b064513bf680d8482765
SHA1c93bf814a4c5bfa6896bd7e55b420308e6c1e6a6
SHA256fd3e1ded5f17944dee1ffaff1b05325e3e08e78231b9054e79f977b859d22b8f
SHA51210e16b78714fa9a4ed465d6411eaaa7062bfd1af06379628bb8791f939c7dd4fd92aee784d75da7599510ad54842d46cfc4aecfd6b1f0d9b5392b2d5092dab7f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\datareporting\glean\pending_pings\e45715b8-b75e-4700-84c4-bc48af5bf94e
Filesize4KB
MD5bbd3dbdf1315b2ad87cc1121767ece2b
SHA1325fab03f155467ce39e22c1fe5d3bb00c54b74a
SHA256cebc3543740450b8f479b5c624f2f9e0c70467a5c517ad881039d10825458c89
SHA51271cd29eb1715ab46af67edb60cdef0f04611f515920235d855f1b26021749e0d4f95c0f504252195e880958d49292bcc4a52fe2a887cc02b2a5011eb95940c99
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\datareporting\glean\pending_pings\f75c08c9-7b88-4e3e-a3d9-659d27139bd0
Filesize847B
MD5fca7ebaa8d6e65c6fa6b1079d3b0d18b
SHA14e3c0d35ed5e7bc612cf8cc93b1a534585a51adc
SHA256abbb741d8b2dda8e01353d70a7efb36ea33c45d7a264fdd64e02c7c0c6d6a1bd
SHA5124711cf8ec390286013817854c41d479e025de5cfa3d3f6a7503fba3fe8ebc58a416ac9fe6dd0d842aec7fb758ec3d0c0f501add0cb2f0c0a3533d98fcae2ba02
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
288KB
MD52be005c64cc038c9086b06f6410a65a3
SHA12788c9a992aaad6c9fb4aa2427e24b8decc3f8b6
SHA256fb38ef26d13520e1492e722c4f142a9ff5772c8919c655d0adf96f93e7382c9b
SHA512384d8ebd0d09e27b70ee5ec07ff4b4b1f40d093f34ff25a21c84838e938da4ca3aad3878bec03f82c3202d1aca10da5f0f15bb7abe08e662230aee8b1a9179ab
-
Filesize
750B
MD544a4788ab8fac2c92fe7f0b1a8656f27
SHA105bed492f2abec46b71454068906a4ecc28cdb27
SHA256c2bb9d6cdf54bd8a23b460beb5725dac9a3a58571f3559db5599e2475836b843
SHA5122b68089f23e8294a045a32fab19b14dda0e13ef68a4dc94660d74b2f2e0797d2a3cd80d9a05fb10c1b268a4d42db667cea6f2bb74952204a7c7525d03e4fec9f
-
Filesize
10KB
MD5baa117cadf047a7b57f400d169996649
SHA15f99f7fb3d2ba4aa2dcc48c7820c49bd3b344685
SHA256cdd5a5521fd7a4646a72a3b8a38d68af9ca130326789d39bbfb9d8e1bcc76767
SHA51255fa640bb102caccbb129102df28982c2d0406755cb81d0d34cbe3b7d0d533cf0cfe0592327ff87a74e8f80aa8f12797e79204d96d5036df5bbabc517f08df26
-
Filesize
11KB
MD55c8aa9f2367e5a56207617caa5867c7f
SHA1ad60170a59635981f69d6e0ed50c535f114e26ce
SHA256900fd174ea2862e96d128abf021862cf7263d238462a59edc4cd6149ae7e8c0b
SHA5129975764580c1c2291b8df8ce7bb798b5af954420fd091e4eea5acc0ed5d08a3056c76b8bec8882490e8d1ff69f582f8a03a326ec62754a8718c06aaca4015730
-
Filesize
11KB
MD5f4fc930d014210533043c1a0d43a791d
SHA18a74aa2dcf16f894f30a043b6095e545fc10950b
SHA256a8d854549fc8c90228398a6c43bdef4b57af925d9eb33bab263824ee4a142c9c
SHA512a4cdc362b3da79c8600fbf362789e9a6e0ae01fb0ce25fba4a1694d9a02b6e9235217f6968aeb3ebcbd3ba1e2d98290b3ebf40b5216c8dee3af7a0ae2ead1b62
-
Filesize
9KB
MD5229e8e18cf0312d83a8a607fe23ffda6
SHA1132258d86617ba3b9ab4039962031495200562c5
SHA2569ef489ac23354680a382add216252a58bd51d469c434eda8366365149ed9de23
SHA512b1ec1a514dfa4dce9dd84d12a99ce56b5be5eac31de9a724f550dd24d41c6cdb99839881285421f4d54f8a120a3c4fa3d0d5cb08bc2495b8d51f69512fdb10f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5ff8018894a740abada7de7eae1aa6b35
SHA1716de60b5d5551cfe905d2a761c5dc595b889ed2
SHA25613371e73e413dc06d274d88624368cbf0bd2d7cc85eb59661affa50fbc481122
SHA512144732573fc066aa6cc90301d3b471041e11d3b46d7cd7bed2e52109d403e8a337c083c0e7546d4d6d337597c7b52ae355156dc8152d37876aa5d4307fde8ac5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5861bf91bd27ade75d876ad764b48b7d4
SHA119dc7ece7bd4d017501204b5b1a0b790be3d754f
SHA256aa1b1023bb6aa5c1686b456f6cad63439d43aaa5d5b552a8f491f2a10256b0fd
SHA512488f5f587d0e80583f4d7a0d845030d97b7e66a41a73073bc469c96e8045671b8b9e61a8ca61697684147c6bb66cb75069b80521c0a049e13a18b2769830e804
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD514da4a76cda3304fef32355437f6745a
SHA136be0ffd6a7cf18670ccc2f9467a79d609d43a80
SHA25680ccb4a3bc344b4992024b91e9f6994cc59d347d7b5c97d26771f507d3500797
SHA51284828d667c542fed6e3c7616a1d578502d356e0fd8696b170b1439e023b85b89c3a582bc0cf1c019cab95fc01c2a57e7a188a2871e62ee3cdafc024c9883f831
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5eef406cea3170f2bd58e9e52fa80e2d5
SHA146900cf172a707dd26ddcf49ab84d6f722c85338
SHA256fe7ff1a8706772d1be699f3deb93c3beca686b43986897aa5d5d2fb011ae4c77
SHA5120f32e3c4c898c19a3c31ab559446fd5256007cf074e00e2abdc5f1194884cc2acec41d8638429d30759f139a31a2dd71d5c66fd1dbc76ef104ffd06919a587bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5a8a2def25f11c5b84261c7cb824a42c6
SHA18c71c704c36935f821474a25da1cf15525193311
SHA25615c07d095804f1dc48e5e1542f62ce0bf1582c1c0a9906d1de9a72d9287e43cd
SHA512a2b5fb28d872ca34f3e1b28a334622bb9fd5f59031a3fd6636d45b9bd39de3e1518c60049b4ccd50e8aaf6dbee6067426a5938b6eb7d0b024f5fa9d709edf8a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD55dfc1afc800ab5a5ed356dd2eb6c9479
SHA1f195771d47a1d16b8514c5bdf9099f9c289fdddf
SHA25653a1aaaee71aa5374e4b355872ccfc22e97e4f2148bcd71fd6855bd409b9fb55
SHA512161001a7912014b235d27fa8c75513aed30c3bc975f59d8cbfca980a5a9308d9125417ce2b9d56973a4e42b9848b4248ebcfaffbf7ff45ad22e846ef46df6d1f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize12KB
MD54f463041247b69047d385ccf241964d4
SHA1df303e4074930db2140210563ef88e39ff177efb
SHA256ed21f14bae182b8e7ade35b4527a9c26be993f526b8c4b05ecbded7654dbcbd9
SHA5124d29bd7813ea3e70a9a94c026770b5e7fb5ac22b8af26a7cc177890b6d9f1d8bc24249129ab03e56b75fe5f6454c2fb10e42cabf28f6548c669a0fc2a1e6aa0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD5f2e2bceefb93c558ef799e3feb32fe2d
SHA158035637aa8c542111aa152b9cb10e12b45690d2
SHA25668f89e2b988ee0c1009d266e70c46b505fa0c63bcea32ce7a8c2df343b0d5a85
SHA512bda61146ca27ff2c9556954a7a6c0757b52426738d40dfb661222b98682cdfc691fd2b0c1e254dacddc550a940c71031bd71edaf73c5f5b6150635201ed8ebb0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize13KB
MD5c8400eb4a7efd24ac2aa69b065ec992d
SHA12dad1e6b71ba7af5faac45f57bde43540486f489
SHA256182f0cba2bbd66381434944bfe202adb5bd23778de04ccfb4c3964f851db7c63
SHA512ad5db8334eac69b69eb508121ab2404ff3ebc581374114c1eb3e695409a00b66a5ee03af57edb62c7df7e6be64aa49fa51160c91ad202d1741bf5732746b9f85
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize9KB
MD57b019a4c6611df075fd323605c831986
SHA180b81ce78f5fc0bf4c546e644d68d70aaf4d9c74
SHA2569c760b3f42871fced1faacc8f5c49f80f9a7fff2c18bf758d28f5e01d524f2d9
SHA5123084c0c67d6b46db6bc44c3960cdd35b1e6363058aab926371cb485067cba64feea46f309162ed06ab0751135601c6c98d74d7a9d07227d204d8ca035f304f9e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize17KB
MD5611611ce1d72438ae8611b429fbfb2f2
SHA1fea5a79f4dd3ada9b7bf5adec89090baad75cd3b
SHA256e8dc4368afe5e594bbccb60286134b1f540960c6997a6546a37319718cf643ae
SHA512415d2930aa0c357153be2bee02942791a1732b3b7438f63f46e3ee1bf407a8786fae182cbeb55009c6aeb6fd3a226505ac55cb9f918052b0eab67c83cd6ad7fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize15KB
MD572cf299ea1affeca819f2cf9f6a876de
SHA18706c868cbf09fe311b4cc9f29991bda33fc825a
SHA256bc05192f86878f51ef75445eda47e3d0d1593a74fd67074a26ea5a2a639782ec
SHA51287d48969d4563769c42525f32557c2300f2d4f2de86068b437b0883d88a8bc5fb3bf9ef3f39763a46e59fa35c4c28c82b4165fa0897f02f959315a239d605f89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize17KB
MD5470d9ba01cea068efedb170bdc8658fe
SHA1478a10087a0478835995a529bb2afbf43d7b60e2
SHA25675c918a0b20d6132005c029bce18876310aa2650b243a10ff1c0da27cca344ec
SHA512be3657b57a743ffba46a95724f68ee7f3a5bc61a466010c9d8da52242c6790db851d73bc3a96ca96503fccdc28505bf0e7aa467b97705e776fdffa506ba5b059
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD56dcbd63a7bc061c8114f280a2809b0ff
SHA1c2f1060091934d56d66389c1afe4a0f85f35854d
SHA256afaff69bac09731034346fb115e06f433a0a1969cc61a9e193c449045bbb4f67
SHA51234cec733ee7b72bcc865f204cf2c6f610c7f53305f4582fdd3447da2004e3cf67fff88897f6d2bd58078e743ee55bcef5f3b9710921a19b212be721d407a7472
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize18KB
MD59ef78141afd7f53f63ffcd789834e0cd
SHA146fbada620d9c03194cec32a954084b72086007f
SHA256ebb1d6ebc9860564c5b0fe4123350760576f08d3d21501d49f5668d98173896f
SHA5127aa869a86f224d6e12c1c61edde75c54ece74f26054680150f2ec77bf3824ad8ecd0006a7005ca5e140df8e2b15f07d98647b2d5c73558b02f2f0ef688e67fb1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize23KB
MD56950dc61cc73ca9b76b34bdc2da6178e
SHA1877ce460b87144b8322e91096b6c42531827bbc9
SHA25657d5683bb9916574106c7147f0efe0746f34b831c6b663d490b9ca7403859e1c
SHA51238d0d84817764d66cbad7f2daac30d235057a021a7601bf964e63798b9fc9d7e08be847ff728fca38b4b38e7c2a9eeb60b52369bc2fa3f85e4118295aceae696
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize18KB
MD58248b9a7206fcede71e24999f1082b0a
SHA1ae8d338489b2e5b2f2c76a387657c46a8ab09f11
SHA256500f4534b49da25d7932ccbeab70fc38bff33e64aea2fac957ee506f1ba49cb1
SHA512ccfb9594a88855da6e99a8f8dc598ea459de301ea404d294b34aa0603866132dec99b954cfa1d09e0ea2670523a68ae4090c6f2eec9e3d184995d4078e12c1f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize20KB
MD5c50713aec46eac29a5ef8d82ea4d86a6
SHA12767212ee76d749691775bc71536d9ff7a084d7f
SHA25617f58e99794a1cb439d9f919787f4a8e84826cba4b85deac36e1bf95610100de
SHA512f5b097037208e749c3dd318ecd38bf8aedb365e97fbd578e78926c055eb8eee49631542ac69838f5c29ac881cc577874f71de35d3aa8fcac4dd433567a0f9e8f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize22KB
MD5eaa2c87438c80f845b259d3418c3b8c5
SHA19f16d91d7a5b7443664fc502a0fa5bc3da35d373
SHA2565fd6be43d2932e0771b3bf401e699fbb2bc2a200bd5456f11cdebc59b66e6a50
SHA512b3553689a0272e25bae5162b268490204b814463a01cf55970fd4c11a6efe8dcea05c5bc142da7c2c794c179b3fe18d60e3a05c4e6818fe1b2d244de8f7c90b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize22KB
MD5485026430f0a3fd38fc2fbfbf409bde4
SHA13794ce3869ce3f5442d62c9d28580d2810e47e92
SHA256d1ddf30bb92127bb2a2132c56063b11396608c8c9e8c13d30fedc7c069b20fb0
SHA5123118ccb9a2adf96d09047672c1ba2d26c5306a3b46cc6a2d2338d93958bf6a9bdc4e508b85fbddfc122612049c9de4c5229e580fd3b6684ed379b8b19eebc14f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize20KB
MD5b5a9cd4e67f1d0f99a68017a8606442c
SHA178a1da5c8f99ee02f06872aea63cf0327c74b792
SHA256662be6ecc34489c91fc93a29e1ad1c5b8b948d8ace1b44a2edce791823b381b8
SHA512a262bc28f8fd3ef7f261ebed768f156fdc3a70f84ea8f586cd3d065716125b1c68d4618a8236802233d67bc26a8565f2f6c1e9a68744d0a20b280703a5c01d0c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize20KB
MD5b9d004d8e6ee78a2799f6634daa561eb
SHA1643453d94bd1ff8725f231256913c29b6db52497
SHA256f24d991f3832b49d5032cc60139c004155fe87faa1a9f94b5cae4bf01f1aca59
SHA512b7c9d51cb881544e9bb70c278b7ffdab95be263bea5aa7201900e6415381760b9791efaffef3be9db5b783904808b3d24ec48288d040a2f4a5b2cac00de468f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD5c431b45cdab06b83c81cb304aedc4353
SHA156a824a0369744a2e61e9e7e5cd753dd1862bd5c
SHA2567eb209b2307c83c9a177b2cf2a669bf2174a1aa1eb179c4bc1f5652f94a73509
SHA51288cc508291adda4ba96c1a9af1978ee97c675ef83796d5942680c76e3b707c5297b858c9af61ebe212f9b33007c473a0777701dbb15aa8e2ea1ca9bca7361f3d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize23KB
MD5f63db7dd8046a6fcc1c37b0e067d5f24
SHA1fd726473079a36a07630ab38665890d2da1be6e1
SHA25651e5ada92b358a232c44ae956658f031f44dc8a619c51076f718a25157375017
SHA512a14b69a005d713dfd7ba67a983179c4185b9d0404fa73b7baa1c0e6d8309e2025a60aa13f2c0ac3f25ac9fa40c2bc66a17928facb2d32872dc03b121883d05c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD553e0e9c351db34330bd83fb64c397082
SHA10a743baca97d53b1fb9a5a28f91f4596241ce004
SHA256b66c0117bf8c723130d07ff40e36a7824a4df1a1556a89ba904bb51eb97dbeb8
SHA512622a644f4886710970e396622cad9ef15e7e3ebe7ef57b257fb40e95ba49890e6f749f8a28ef84363a23a71622068fec7939a931201cc5ee47695bfa9a0cc0ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD57a4cb228fc655eb0db96049a33502a32
SHA13ab06eb347078b7bedb21a76aa9a7f0cee24ac56
SHA256ce05a671e81df4e9ab12f567b67552908c515e54336c82235fcf12763dbd9b64
SHA512fb7b1cc344fdec04fb0beaf65dccdb1d29b604e8df713d5fd7e5b0d262fd2e4d73073ec1dddb4c3bf1faef7b15f0064497308c231e04ed53017d1ed19f8a3c9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize22KB
MD5b500502b82fd90386c2499864fdebfbb
SHA1daaf52805f247acc38a91bca5804217a86d5510a
SHA256378137be238baff07fcec48614605bf695b0403830acaf21a4aaa9153000bd55
SHA5121dcfbdd69540ac6eb2b505979414c5c5026bb8e37b381e18b5af061c398e66d548c644ded60684bff011ba2541a4dd736974b7cfc5a2fef6e4897478fe9e3066
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD505ff60d913983adeccaef30af1279e62
SHA1b6a28c0a1bf9d0510d699357545b58c194d02456
SHA256018e8b66c7433bd642f7a9e21ba781f6dd509484b151ec69f261e79c02745e0b
SHA512cf5bcd8963e1106feb9155a8a1caef342e1a0a84ab1fcb3c01fcb77972af86f180be1a74db78bd61e151834bb3a3b0c7db3af7ef66923d2266b5f5b98ffef67c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD53c383da1dfa8fb130c4a34828542862a
SHA17955165e4b21de3992dcc46bcd7743a989534b31
SHA256a71aa01f4359e1496dde0dec3c9599fddbfc98a23cd3967d2be2a21cf838313a
SHA5129fd6d804a3b593aace6ede216f941aa496ee1b114954b5e2578e67d6396c5c329d4548b885b9da55b0a7d01b96c2a90af86c59fd3cb27e19b4dce84ffd308234
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\sessionstore-backups\recovery.baklz4
Filesize24KB
MD5d4808e8854fe77b6361480791f6215ac
SHA1e526aa1f7abb244ef330a133841825a8428566a2
SHA256c2f2d8184ea41a56f177d9c46b8e82a2dfd159468941f1da9cdf7493914a8cc9
SHA512b53a39868bfd2fe1017d6fb03cda9539b9ed6d414da44296c4234f741fb5c4d7959f4d303a0fa65aa204165c93147c1c4a9b8ce551f682c6b7bf75e73a8acc32
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\storage\default\https+++www.google.com\ls\data.sqlite
Filesize6KB
MD5a27403a68ff3d0dc2702d8fef48195c4
SHA145da5501c173a80ae21080b5152dede94064fdad
SHA256aac53929402d2791c595048356167583a66ce637a49dffc984e5d1b8ae0e3235
SHA512ddd2f527e039eb7ce2785ccedc99363517529cfd48a87d14b69c51bd6de68c349e8ec2f55b3c85e2cfb0f6ff62e61909d8eb4dde9957d25076764228c508dad5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\storage\default\https+++www.roblox.com\idb\3140325527hBbDa.sqlite
Filesize48KB
MD503d1201bdf492fa5ef2b9f7d94f6fa07
SHA1670e806f1b6109a88da7f2ebbbd44ab980fdd057
SHA2569d76cdf9ca183f2434253c42f4c25b53d989d22762b97c5116f3e027a2e93082
SHA512c95d12f1823742ff7350ee81b54c7818c7ea4c76f5635b6aa35ad9d84f5b906cfe59e9a9396a9aec037c7b1acd9658fb5a907818878b62f940bb2653d0ad8095
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\storage\default\https+++www.roblox.com\ls\usage
Filesize12B
MD59fda32ed5a52632e1a7fcb908fff34b9
SHA18f66d815b0c3457e3942aa68c33269d51dc92853
SHA25658f0605535863ca480974270dce38f31729812043c3e1897739e38d1a5bd285d
SHA5126bf5fa8c82e7e5cc1477165d9b2ff0b0ce3592f8985d776b5ab0bb518c631d22a46e3e75da50b69a543a41949b3b1d7c18b10bc4bcaca0baa86fb7de2fb4afed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ys8siqnt.default-release\storage\default\https+++www.roblox.com\ls\usage
Filesize12B
MD5cdb7c6cef7b2b2b34fa6d408dd567d23
SHA1a85f449c5849a83f98b5fd9306d02603c471a50a
SHA2567ad67a3602461d64266cd8f735ed1ef823f36e2fc0c866846ab402a743fe40a0
SHA51202171e1005b7289c41250d9d8615f2914ab9acf654708fc450ca1227ba5d830992953aa267c31c9da64deffd580499316ff8c1e4fde43b2525ea983bda9c56c9
-
Filesize
184B
MD56ce6f415d8475545be5ba114f208b0ff
SHA1d27265074c9eac2e2122ed69294dbc4d7cce9141
SHA2562546dcffc5ad854d4ddc64fbf056871cd5a00f2471cb7a5bfd4ac23b6e9eedad
SHA512d9305862fe0bf552718d19db43075d88cffd768974627db60fa1a90a8d45563e035a6449663b8f66aac53791d77f37dbb5035159aa08e69fc473972022f80010
-
Filesize
7.3MB
MD5027183c8f1be3ad3b30d3c8cf7332988
SHA1a7de0320e768d2f737c30e77be4ca5043c3dbe55
SHA2565f02e34dc5d7a478675fef3b4bfa9ed321bf6b6f8d6804aef7b243e360fba2fd
SHA51266aefb4f2295d66da768ada2849e498145ef0f8d1e2e4c4bb7daa1745b6937742451c2f1eaf3dad35833096179e4b9d123487d744106a709f34c6a7bc8f589ac
-
Filesize
118KB
MD54b6229d1b32d7346cf4c8312a8bc7925
SHA14d83e18a7e1650b4f9bb5e866ea4ad97a21522bd
SHA256ff24b9da6cddd77f8c19169134eb054130567825eee1008b5a32244e1028e76f
SHA512804f7e663f3a4e03f99e19f7ad8e89362c9d11793ece2e0716f86bce020f6ce95766fc4f6e686375b73d0b6765cc75029d8d6527abe0777b91ec807f81c7146a
-
Filesize
47B
MD5081c6d16a42da543e053d56b41e011a4
SHA17c3b4b079e17988aef2deb73150dda9f8b393fdc
SHA2567a4a7fc464c0e33f4959bbfad178f2437be9759ec80078a1b5b2f44656830396
SHA5125a65a2b81c0d001be174a100363adae86bdc9af02360fbd2c87ebdb45d62833104e4cca90473f1156792473af5922e947677585c55052a99868e6a395aa457ff
-
Filesize
280B
MD5a363985cccc70dab56bffa5a692082a6
SHA1620c8b99dee3c3b9bb84c8b25f17cf7c6170f8af
SHA25683780f5d9e4c9425287c7ea21f6338967786ffea12159af61a94e5fe67bd48e5
SHA5123a947a1ecff9aa9fe26a5802ea9c619b8a63a69407dd9bb58b73b67d768722a5c6ad23c1618ee537220764d71d20ae4c531af9a6db032c914967e3e58c7e40e5