Analysis
-
max time kernel
257s -
max time network
259s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 19:31
Static task
static1
Behavioral task
behavioral1
Sample
ExitLag/ExitLag/SetupExitLag-5.11.3-x64.exe
Resource
win7-20241010-en
General
-
Target
ExitLag/ExitLag/SetupExitLag-5.11.3-x64.exe
-
Size
1.9MB
-
MD5
a2740a92c172999364a2e14640c2282d
-
SHA1
36e463f16266396d1dd96fb1b48e531abc487931
-
SHA256
81b428f9b0e1c92d70c2182ef60139d5508d350e74de60c1448b82740bfd1f46
-
SHA512
3b1fcc91f22fcdf26cc5f28cbad0683d4f1d8b39f1b82653af7837eb3f20e690df903eaccdf116b23c3f53baa345698f3f2288e679d48f66012c4fc99a5df81a
-
SSDEEP
24576:MDLjcheV9PUNZoMe+wL8On+wKGi0JPrVI4ejXguTIC7utQsSP1IbQs8zilx26mX3:cJUxwFPrsguTVuiTP1dPzkM34y5tmMj
Malware Config
Extracted
quasar
1.4.1
ExitLag
SigmaDM420-46661.portmap.host:46661
fe774c0e-778c-4779-a984-24ecd4d23c8a
-
encryption_key
EA7DE9E3D9AA87430367EB4DC49C64AB55F256E1
-
install_name
ExitLag.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
ExitLag
-
subdirectory
ExitLag
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x000300000001db0a-25.dat family_quasar behavioral2/memory/640-50-0x00000000006E0000-0x0000000000A20000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 26 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExitLag.exe -
Executes dropped EXE 29 IoCs
pid Process 640 ExitLag.exe 5036 ExitLag.exe 2240 ExitLag.exe 4488 ExitLag.exe 4332 ExitLag.exe 3572 ExitLag.exe 3272 ExitLag.exe 3728 ExitLag.exe 5168 ExitLag.exe 5672 ExitLag.exe 2376 ExitLag.exe 5184 ExitLag.exe 1380 ExitLag.exe 5956 ExitLag.exe 5452 ExitLag.exe 976 ExitLag.exe 4500 ExitLag.exe 3068 ExitLag.exe 3588 ExitLag.exe 4832 ExitLag.exe 5888 ExitLag.exe 2272 ExitLag.exe 3544 ExitLag.exe 4208 SetupExitLag-5.11.3-x64.exe 1708 ExitLag.exe 1612 ExitLag.exe 4764 ExitLag.exe 2796 ExitLag.exe 5812 ExitLag.exe -
Drops file in System32 directory 58 IoCs
description ioc Process File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File created C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File created C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag\ExitLag.exe ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe File opened for modification C:\Windows\system32\ExitLag ExitLag.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Skowsand Tecnologia Ltda\SetupExitLag-5.11.3-x64\ExitLag.exe SetupExitLag-5.11.3-x64.exe File opened for modification C:\Program Files (x86)\Skowsand Tecnologia Ltda\SetupExitLag-5.11.3-x64\ExitLag.exe SetupExitLag-5.11.3-x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetupExitLag-5.11.3-x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetupExitLag-5.11.3-x64.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 26 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5276 PING.EXE 4948 PING.EXE 5096 PING.EXE 1848 PING.EXE 828 PING.EXE 2140 PING.EXE 6044 PING.EXE 5572 PING.EXE 3396 PING.EXE 5828 PING.EXE 3804 PING.EXE 5300 PING.EXE 1896 PING.EXE 2348 PING.EXE 5580 PING.EXE 664 PING.EXE 5528 PING.EXE 4632 PING.EXE 756 PING.EXE 3248 PING.EXE 5304 PING.EXE 2920 PING.EXE 4568 PING.EXE 5780 PING.EXE 2084 PING.EXE 5236 PING.EXE -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings SetupExitLag-5.11.3-x64.exe Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings SetupExitLag-5.11.3-x64.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\ExitLag.rar:Zone.Identifier firefox.exe -
Runs ping.exe 1 TTPs 26 IoCs
pid Process 3804 PING.EXE 1848 PING.EXE 5276 PING.EXE 5236 PING.EXE 5304 PING.EXE 3396 PING.EXE 4568 PING.EXE 5300 PING.EXE 5096 PING.EXE 5580 PING.EXE 664 PING.EXE 5528 PING.EXE 1896 PING.EXE 828 PING.EXE 4632 PING.EXE 2348 PING.EXE 2140 PING.EXE 756 PING.EXE 5828 PING.EXE 3248 PING.EXE 4948 PING.EXE 2920 PING.EXE 6044 PING.EXE 5572 PING.EXE 5780 PING.EXE 2084 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 28 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4908 schtasks.exe 1112 schtasks.exe 828 schtasks.exe 5472 schtasks.exe 4796 schtasks.exe 2416 schtasks.exe 4764 schtasks.exe 2028 schtasks.exe 6056 schtasks.exe 3140 schtasks.exe 6092 schtasks.exe 2448 schtasks.exe 5764 schtasks.exe 5232 schtasks.exe 2644 schtasks.exe 3140 schtasks.exe 5228 schtasks.exe 2252 schtasks.exe 3196 schtasks.exe 4464 schtasks.exe 1840 schtasks.exe 516 schtasks.exe 5544 schtasks.exe 5964 schtasks.exe 5064 schtasks.exe 2916 schtasks.exe 5204 schtasks.exe 2592 schtasks.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 640 ExitLag.exe Token: SeDebugPrivilege 5036 ExitLag.exe Token: SeDebugPrivilege 2240 ExitLag.exe Token: SeDebugPrivilege 4488 ExitLag.exe Token: SeDebugPrivilege 4332 ExitLag.exe Token: SeDebugPrivilege 3572 ExitLag.exe Token: SeDebugPrivilege 3272 ExitLag.exe Token: SeDebugPrivilege 3728 ExitLag.exe Token: SeDebugPrivilege 856 firefox.exe Token: SeDebugPrivilege 856 firefox.exe Token: SeDebugPrivilege 5168 ExitLag.exe Token: SeDebugPrivilege 5672 ExitLag.exe Token: SeDebugPrivilege 2376 ExitLag.exe Token: SeDebugPrivilege 5184 ExitLag.exe Token: SeDebugPrivilege 1380 ExitLag.exe Token: SeDebugPrivilege 1004 firefox.exe Token: SeDebugPrivilege 1004 firefox.exe Token: SeDebugPrivilege 5956 ExitLag.exe Token: SeDebugPrivilege 5452 ExitLag.exe Token: SeDebugPrivilege 976 ExitLag.exe Token: SeDebugPrivilege 4500 ExitLag.exe Token: SeDebugPrivilege 3068 ExitLag.exe Token: SeDebugPrivilege 3588 ExitLag.exe Token: SeDebugPrivilege 4832 ExitLag.exe Token: SeDebugPrivilege 1004 firefox.exe Token: SeDebugPrivilege 5888 ExitLag.exe Token: SeDebugPrivilege 2272 ExitLag.exe Token: SeRestorePrivilege 2180 7zG.exe Token: 35 2180 7zG.exe Token: SeSecurityPrivilege 2180 7zG.exe Token: SeSecurityPrivilege 2180 7zG.exe Token: SeDebugPrivilege 3544 ExitLag.exe Token: SeDebugPrivilege 1708 ExitLag.exe Token: SeDebugPrivilege 1612 ExitLag.exe Token: SeDebugPrivilege 4764 ExitLag.exe Token: SeDebugPrivilege 2796 ExitLag.exe Token: SeDebugPrivilege 5812 ExitLag.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 3976 SetupExitLag-5.11.3-x64.exe 3976 SetupExitLag-5.11.3-x64.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 2180 7zG.exe 4208 SetupExitLag-5.11.3-x64.exe -
Suspicious use of SendNotifyMessage 46 IoCs
pid Process 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 856 firefox.exe 856 firefox.exe 856 firefox.exe 856 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 1004 firefox.exe 4208 SetupExitLag-5.11.3-x64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 640 3976 SetupExitLag-5.11.3-x64.exe 90 PID 3976 wrote to memory of 640 3976 SetupExitLag-5.11.3-x64.exe 90 PID 640 wrote to memory of 5064 640 ExitLag.exe 91 PID 640 wrote to memory of 5064 640 ExitLag.exe 91 PID 640 wrote to memory of 5036 640 ExitLag.exe 93 PID 640 wrote to memory of 5036 640 ExitLag.exe 93 PID 5036 wrote to memory of 828 5036 ExitLag.exe 94 PID 5036 wrote to memory of 828 5036 ExitLag.exe 94 PID 5036 wrote to memory of 2440 5036 ExitLag.exe 97 PID 5036 wrote to memory of 2440 5036 ExitLag.exe 97 PID 2440 wrote to memory of 2144 2440 cmd.exe 99 PID 2440 wrote to memory of 2144 2440 cmd.exe 99 PID 2440 wrote to memory of 1896 2440 cmd.exe 100 PID 2440 wrote to memory of 1896 2440 cmd.exe 100 PID 2440 wrote to memory of 2240 2440 cmd.exe 102 PID 2440 wrote to memory of 2240 2440 cmd.exe 102 PID 2240 wrote to memory of 4464 2240 ExitLag.exe 103 PID 2240 wrote to memory of 4464 2240 ExitLag.exe 103 PID 2240 wrote to memory of 1796 2240 ExitLag.exe 106 PID 2240 wrote to memory of 1796 2240 ExitLag.exe 106 PID 1796 wrote to memory of 2500 1796 cmd.exe 108 PID 1796 wrote to memory of 2500 1796 cmd.exe 108 PID 1796 wrote to memory of 2920 1796 cmd.exe 109 PID 1796 wrote to memory of 2920 1796 cmd.exe 109 PID 1796 wrote to memory of 4488 1796 cmd.exe 114 PID 1796 wrote to memory of 4488 1796 cmd.exe 114 PID 4488 wrote to memory of 4908 4488 ExitLag.exe 115 PID 4488 wrote to memory of 4908 4488 ExitLag.exe 115 PID 4488 wrote to memory of 4448 4488 ExitLag.exe 118 PID 4488 wrote to memory of 4448 4488 ExitLag.exe 118 PID 4448 wrote to memory of 1728 4448 cmd.exe 120 PID 4448 wrote to memory of 1728 4448 cmd.exe 120 PID 4448 wrote to memory of 1848 4448 cmd.exe 121 PID 4448 wrote to memory of 1848 4448 cmd.exe 121 PID 4448 wrote to memory of 4332 4448 cmd.exe 124 PID 4448 wrote to memory of 4332 4448 cmd.exe 124 PID 4332 wrote to memory of 1112 4332 ExitLag.exe 125 PID 4332 wrote to memory of 1112 4332 ExitLag.exe 125 PID 4332 wrote to memory of 4948 4332 ExitLag.exe 128 PID 4332 wrote to memory of 4948 4332 ExitLag.exe 128 PID 4948 wrote to memory of 2880 4948 cmd.exe 130 PID 4948 wrote to memory of 2880 4948 cmd.exe 130 PID 4948 wrote to memory of 828 4948 cmd.exe 131 PID 4948 wrote to memory of 828 4948 cmd.exe 131 PID 4948 wrote to memory of 3572 4948 cmd.exe 141 PID 4948 wrote to memory of 3572 4948 cmd.exe 141 PID 3572 wrote to memory of 2916 3572 ExitLag.exe 142 PID 3572 wrote to memory of 2916 3572 ExitLag.exe 142 PID 3572 wrote to memory of 2640 3572 ExitLag.exe 144 PID 3572 wrote to memory of 2640 3572 ExitLag.exe 144 PID 2640 wrote to memory of 1792 2640 cmd.exe 147 PID 2640 wrote to memory of 1792 2640 cmd.exe 147 PID 2640 wrote to memory of 4632 2640 cmd.exe 148 PID 2640 wrote to memory of 4632 2640 cmd.exe 148 PID 2640 wrote to memory of 3272 2640 cmd.exe 150 PID 2640 wrote to memory of 3272 2640 cmd.exe 150 PID 3272 wrote to memory of 2028 3272 ExitLag.exe 151 PID 3272 wrote to memory of 2028 3272 ExitLag.exe 151 PID 3272 wrote to memory of 4204 3272 ExitLag.exe 153 PID 3272 wrote to memory of 4204 3272 ExitLag.exe 153 PID 4204 wrote to memory of 3644 4204 cmd.exe 156 PID 4204 wrote to memory of 3644 4204 cmd.exe 156 PID 4204 wrote to memory of 2348 4204 cmd.exe 157 PID 4204 wrote to memory of 2348 4204 cmd.exe 157 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExitLag\ExitLag\SetupExitLag-5.11.3-x64.exe"C:\Users\Admin\AppData\Local\Temp\ExitLag\ExitLag\SetupExitLag-5.11.3-x64.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Program Files (x86)\Skowsand Tecnologia Ltda\SetupExitLag-5.11.3-x64\ExitLag.exe"C:\Program Files (x86)\Skowsand Tecnologia Ltda\SetupExitLag-5.11.3-x64\ExitLag.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:5064
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uC25iuUXJPc4.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2144
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1896
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:4464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Y1dGVo4LcWPY.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:2500
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2920
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:4908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GXsKCtAmCA81.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:1728
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1848
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f10⤵
- Scheduled Task/Job: Scheduled Task
PID:1112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\e2btBDnrWfw5.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\system32\chcp.comchcp 6500111⤵PID:2880
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:828
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f12⤵
- Scheduled Task/Job: Scheduled Task
PID:2916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0Q6ay8gWIiyD.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\chcp.comchcp 6500113⤵PID:1792
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4632
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f14⤵
- Scheduled Task/Job: Scheduled Task
PID:2028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qWITHrSZD4e3.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\system32\chcp.comchcp 6500115⤵PID:3644
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2348
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3728 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f16⤵
- Scheduled Task/Job: Scheduled Task
PID:6056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sXtvcLH5fxWc.bat" "16⤵PID:1012
-
C:\Windows\system32\chcp.comchcp 6500117⤵PID:412
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2140
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5168 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f18⤵
- Scheduled Task/Job: Scheduled Task
PID:5204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uHM9WhgSvIai.bat" "18⤵PID:5372
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:5564
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5580
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5672 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f20⤵
- Scheduled Task/Job: Scheduled Task
PID:5764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AxoNOfzzBt4q.bat" "20⤵PID:5912
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:6016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6044
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f22⤵
- Scheduled Task/Job: Scheduled Task
PID:1840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SuBWN1iRCHdV.bat" "22⤵PID:2188
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:4960
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost23⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:664
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5184 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f24⤵
- Scheduled Task/Job: Scheduled Task
PID:5228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2LHMIjmFgMME.bat" "24⤵PID:5320
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:6020
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5528
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f26⤵
- Scheduled Task/Job: Scheduled Task
PID:2592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8Mp9oMecDXPJ.bat" "26⤵PID:5912
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:4448
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost27⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4568
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5956 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f28⤵
- Scheduled Task/Job: Scheduled Task
PID:516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C8AH2jMGHnyy.bat" "28⤵PID:5172
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:4720
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5572
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5452 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f30⤵
- Scheduled Task/Job: Scheduled Task
PID:5544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\m6xpppxJiKCs.bat" "30⤵PID:4112
-
C:\Windows\system32\chcp.comchcp 6500131⤵PID:3836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost31⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5780
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:976 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f32⤵
- Scheduled Task/Job: Scheduled Task
PID:3140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Uii3X80BlZKH.bat" "32⤵PID:2160
-
C:\Windows\system32\chcp.comchcp 6500133⤵PID:4424
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5276
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4500 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f34⤵
- Scheduled Task/Job: Scheduled Task
PID:5232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YCsembPbsQMb.bat" "34⤵PID:4792
-
C:\Windows\system32\chcp.comchcp 6500135⤵PID:4452
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost35⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:756
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f36⤵
- Scheduled Task/Job: Scheduled Task
PID:5472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XR9RBALTtYnE.bat" "36⤵PID:4972
-
C:\Windows\system32\chcp.comchcp 6500137⤵PID:1528
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost37⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2084
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3588 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f38⤵
- Scheduled Task/Job: Scheduled Task
PID:2644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\a2Z90r7bgGK5.bat" "38⤵PID:1840
-
C:\Windows\system32\chcp.comchcp 6500139⤵PID:4840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost39⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5236
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f40⤵
- Scheduled Task/Job: Scheduled Task
PID:6092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fDg1Ps1zqmUd.bat" "40⤵PID:5932
-
C:\Windows\system32\chcp.comchcp 6500141⤵PID:5944
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost41⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5304
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5888 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f42⤵
- Scheduled Task/Job: Scheduled Task
PID:4796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Pw5jcS9KKRcn.bat" "42⤵PID:5964
-
C:\Windows\system32\chcp.comchcp 6500143⤵PID:6012
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5300
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f44⤵
- Scheduled Task/Job: Scheduled Task
PID:4764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s2IO1vM5hxw0.bat" "44⤵PID:5700
-
C:\Windows\system32\chcp.comchcp 6500145⤵PID:5632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost45⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4948
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3544 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f46⤵
- Scheduled Task/Job: Scheduled Task
PID:2252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kFGX5xguvukd.bat" "46⤵PID:5192
-
C:\Windows\system32\chcp.comchcp 6500147⤵PID:736
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost47⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5096
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f48⤵
- Scheduled Task/Job: Scheduled Task
PID:3140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oQZn7N5eawel.bat" "48⤵PID:3884
-
C:\Windows\system32\chcp.comchcp 6500149⤵PID:4424
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost49⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3396
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f50⤵
- Scheduled Task/Job: Scheduled Task
PID:2416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\l1AOGhlPwsGm.bat" "50⤵PID:5572
-
C:\Windows\system32\chcp.comchcp 6500151⤵PID:4272
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost51⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3804
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4992
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:1432
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 27196 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d23e64f2-0f7d-48a9-87a3-c4ab6b625018} 856 "\\.\pipe\gecko-crash-server-pipe.856" gpu3⤵PID:4248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2384 -prefsLen 27074 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6212e73-cd59-4907-bb57-2aff2238d4cd} 856 "\\.\pipe\gecko-crash-server-pipe.856" socket3⤵
- Checks processor information in registry
PID:2884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3532 -childID 1 -isForBrowser -prefsHandle 3524 -prefMapHandle 3500 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {15e0282c-fbc1-4770-96cf-cbe27b3e1ed0} 856 "\\.\pipe\gecko-crash-server-pipe.856" tab3⤵PID:4584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3848 -childID 2 -isForBrowser -prefsHandle 3276 -prefMapHandle 3292 -prefsLen 32448 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b396fac-caf8-408f-86f2-e17fdd55bd07} 856 "\\.\pipe\gecko-crash-server-pipe.856" tab3⤵PID:4344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4596 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4588 -prefMapHandle 4584 -prefsLen 32448 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe81d518-bc6b-46fc-8f7e-bf1dbbed78d1} 856 "\\.\pipe\gecko-crash-server-pipe.856" utility3⤵
- Checks processor information in registry
PID:5464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4780 -childID 3 -isForBrowser -prefsHandle 4764 -prefMapHandle 4768 -prefsLen 26990 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06e14415-df76-45ba-80f1-b1babae15449} 856 "\\.\pipe\gecko-crash-server-pipe.856" tab3⤵PID:5496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5020 -childID 4 -isForBrowser -prefsHandle 4940 -prefMapHandle 4944 -prefsLen 26990 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {45a5a847-174f-4b66-9365-511cdfba3ef7} 856 "\\.\pipe\gecko-crash-server-pipe.856" tab3⤵PID:5620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5240 -childID 5 -isForBrowser -prefsHandle 908 -prefMapHandle 4092 -prefsLen 26990 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {42b76e0b-a140-48ae-b30c-dee149d705c7} 856 "\\.\pipe\gecko-crash-server-pipe.856" tab3⤵PID:5664
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:3544
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1004 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 27872 -prefMapSize 244985 -appDir "C:\Program Files\Mozilla Firefox\browser" - {47206972-3dae-4351-9985-d7344199b265} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" gpu3⤵PID:4468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 27908 -prefMapSize 244985 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {03fa1b21-bd58-4013-abb1-c29f548713d6} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" socket3⤵
- Checks processor information in registry
PID:3828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3092 -childID 1 -isForBrowser -prefsHandle 2916 -prefMapHandle 2904 -prefsLen 28049 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {91c4dd7b-c6fc-4263-8b61-7a7f83bce6a1} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" tab3⤵PID:4148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2584 -childID 2 -isForBrowser -prefsHandle 2724 -prefMapHandle 4160 -prefsLen 33336 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f78772a-6834-482c-ac9a-5efdfea5f732} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" tab3⤵PID:5596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4788 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4828 -prefMapHandle 4832 -prefsLen 33336 -prefMapSize 244985 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {73fb247b-25c5-4ab6-8d48-f3eefc58c0f6} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" utility3⤵
- Checks processor information in registry
PID:4952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4952 -childID 3 -isForBrowser -prefsHandle 4900 -prefMapHandle 4896 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a3b8788-fa1f-494e-be32-14da92a5e586} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" tab3⤵PID:1080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5072 -childID 4 -isForBrowser -prefsHandle 5084 -prefMapHandle 5096 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ece6c96-3946-4e15-a935-4f846a99d1a9} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" tab3⤵PID:4248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 5 -isForBrowser -prefsHandle 5304 -prefMapHandle 5316 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {14971290-e28e-4d38-bce7-9180cf1afe1d} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" tab3⤵PID:4944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5724 -childID 6 -isForBrowser -prefsHandle 3524 -prefMapHandle 5740 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {25ae8eb7-2a13-4f92-b832-acd7a8387087} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" tab3⤵PID:1920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6392 -childID 7 -isForBrowser -prefsHandle 6384 -prefMapHandle 6300 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d23dd586-7530-4b47-b8bd-8c3bba8a47e0} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" tab3⤵PID:5540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6596 -childID 8 -isForBrowser -prefsHandle 6576 -prefMapHandle 6568 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5371e5f-3433-488d-8c39-3394ae394c38} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" tab3⤵PID:4092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5264 -childID 9 -isForBrowser -prefsHandle 5228 -prefMapHandle 6572 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {831dc16e-8991-4c8f-960b-1dae9c1bc229} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" tab3⤵PID:5924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6892 -childID 10 -isForBrowser -prefsHandle 6812 -prefMapHandle 6820 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {91a0073b-3809-43c7-b581-f6f2694b9866} 1004 "\\.\pipe\gecko-crash-server-pipe.1004" tab3⤵PID:2716
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\ExitLag\" -spe -an -ai#7zMap1429:76:7zEvent90991⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2180
-
C:\Users\Admin\Downloads\ExitLag\ExitLag\SetupExitLag-5.11.3-x64.exe"C:\Users\Admin\Downloads\ExitLag\ExitLag\SetupExitLag-5.11.3-x64.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4208 -
C:\Program Files (x86)\Skowsand Tecnologia Ltda\SetupExitLag-5.11.3-x64\ExitLag.exe"C:\Program Files (x86)\Skowsand Tecnologia Ltda\SetupExitLag-5.11.3-x64\ExitLag.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:5964
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4764 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PApL29J225zM.bat" "4⤵PID:5048
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:5136
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5828
-
-
C:\Windows\system32\ExitLag\ExitLag.exe"C:\Windows\system32\ExitLag\ExitLag.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5812 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ExitLag" /sc ONLOGON /tr "C:\Windows\system32\ExitLag\ExitLag.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:3196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\z1T8Btzl38Q5.bat" "6⤵PID:5936
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:5536
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3248
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5610bbeac4d46cf686afd2382529ffa0a
SHA16de342431af0dd45d1feb93f96d5bbc88fb8bd94
SHA2565eea7881b3379196d253c942cc8bc30e94adbc3537cc5666eb8dbbbb1d22edce
SHA5121f5a8dcf5e2031c6b1164b1b0f5b03ba736cf462340b352ae5b944bc6f4e42d0b951ef4e014742f6c113435c0ba5f6f1fa5b795b57f5639d6b97159d2f1bdbf6
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5a56ef98b6c5734c8e9541ecf39d4c123
SHA1aca65f8f215cf626814b48e706d7b27d9221c1ab
SHA256ef223e1b6060db2c90df2af771f63fa8d7e3e0e65610c1c6bc3a04b739c0b099
SHA51253460ad460f8c2c407fbb4b2a8f8c084a4481424d5244fab84d0c5a089ae55564e385d0ff76ecb27c28d087f81e99f896099374ef795e43205b03869bebe27b9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD568952f57df9c86f1b514168b99e73353
SHA18bb899658c5815bdcb7f92a7e7c755f443709c1f
SHA25641409724137f06278dac834124fc2958845e98b1865ea7146693e084371045a7
SHA5123aa7a4a4311a1de73be6039497631880a5f93a036184a6f648dd862e7a2c620ade5a2b84a87a360347a8c80459876ad6465f544c086917e75fd25ca9c3b4cb38
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495
Filesize9KB
MD58dab664bb1b6d96a00b52aeef72a4f7f
SHA179cd37443fa22bd711f072a1d123c62125538c58
SHA25645095f094b5ac2ed7fa9e66cf0a28ff52b39f50d28a66f5e9741c6a4ef0d883c
SHA51259d5cb1063db5caedd29e1db204b512799c0ab86408ced2613ffd2854db3c4202442b3d2fe2cd0ce8c979196659155fb9277f4561f5d933d235f5182a58074ff
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize13KB
MD59d2a028a5715afae2110644494db9a6c
SHA17f46e0311282e80867a77bfc4bede216e7f5dce8
SHA256bb4c0c10e4b8af512ee0acb6c5d0ab4606ae68803857ae9ee4514b3b1dd2c36e
SHA5120982b8759b4d25adc240541788fb3dddb32fd99b4e9ada16e56ce19aa104f0b72ddac5a485398c411d40f56a6a242d93697efbd792a354cf17bb6a47ad4dd594
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\cache2\entries\D18FB7DA89F8DD4E7A2C97703A1647E8C981D05A
Filesize13KB
MD5955c03ebe71781fdc788b878071d0722
SHA1618ea17bb22bd5dd81f3b66833df7a3c1970e5af
SHA256c325e02fd597a0dd3cfe1982c107bc17f404d50aa3e860c8ae9ab9a0a424b624
SHA51212004a4486435d67d8bcb688d6b3fbf5af7c8523106a34893bd09cf37491b0f30b8d2f7bdc1121e90ece56f9d0c0ed7069f4cdb6e5cf3e4edec85cb3c923efa4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\startupCache\scriptCache-child.bin
Filesize469KB
MD515405b40b11396456243a08ab4c1f30d
SHA1eda1aaf4281a3f6ac05af57ae91e37f6faf3048f
SHA2562aa3c813af62320d33d79d971fe48ef775ff66a716658e428b043e2425e721b1
SHA512e7aadce7de8ac6ca2243cfba8ab242ee6b7e7590445c4d8bee16d39cbfc2b74f0095230ba2bf70db70eede4a3cf1be98372bf79c3bb0db2826608a5da4520618
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\startupCache\scriptCache.bin
Filesize8.9MB
MD5ce546bf2c813a8fbc6619e303fae4eb6
SHA1633c8ac9dc36c1aef7627c6f2d63e883c389bffa
SHA256a8d600f71a9a25327f33c4316339ca9b98772f60de750d4ba437568fbe988ed5
SHA512bca321f29c7a664ff52deca786b400efc5f1aef222f34f572726fd15ea8a40c67aba2f9e9a6d3a58d44ce8a6fd4a5044edba1af72e07609982b6f249b6a0371b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\startupCache\urlCache.bin
Filesize3KB
MD54e0d8befff0d01fe81fc057fdb8401a1
SHA1c08a09dc173f835f774cb15d30e624e605e76a47
SHA2562fbd425f503fc988edee3da4ea8260cdf9711d1c1584eaf711870300ac0d43c3
SHA512ffbc5648c9e1e2c16bc5b3803098130ce7be6de29ea02fa5238a5d62e0d7600b9266342c8bbfa6c2d2fcad753a76216079ec6c3961fd154d252e2bb971cd6f43
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD535122584b798869620a03685884f3e44
SHA16cb5c3d4401074917d0cb29decca71674fc681d4
SHA2564ace4e25e01e734e5b168c7edebb8d7ebe2dd7d30cad6bf537500ae7a5b0af97
SHA512eb903324fa69657abefb95e47d003b893f2cea3deb1061020f4e9a1ea9b126511e2db38d7ee25eae1dceb9d0406f3dfebfdc54db6f1d6511af6250f27f6ed956
-
Filesize
198B
MD52071ae4870cbe538435bc57dcc4846eb
SHA10048f690840c4f6e35e8983c694f75806a435fa7
SHA2565e109fa5be4fc2da15b477a1ecc5f71d2f8c994a638318918871161f693edf59
SHA5129b8676665b0b031a105a22d69f2d27b0c8ad9021aee6e4c6aa3ef2c781007cef065acbb3369f1c82ba28173be6404d42800165c2e2bec94a0b95d1b7793d8923
-
Filesize
198B
MD53665de050617632614937d348a18171a
SHA182387c30e846ed5fb54d40f997cc609bef04de69
SHA2569c02af08962586f9bf7c2b40f5ee0733efd3ad43c6c2bc37610a5cfbe152bb36
SHA512154e202031106a7f1cd827fce6db197f2130d3b834d0ffc03f0d08517af2d9d949533e1555f305837b0d480b6e52e411478575917f56bfc49a7541747e921385
-
Filesize
198B
MD5933dcbeb6bbed3fc4ab41696b5f89a16
SHA192e81ec2ac74bcbcf37cab6c35175b15298e6a9e
SHA256dad30f602d5ea7e25fb44fc60f7b85f6c8231f2fefbf239cfa5bdaa25077ede1
SHA512abda81a35b548b39652a57ae61f4f12b4515a8fac85eda82e953bb6bb4e6cbaac713cf29296c099470104685ef739a7e09fd70f679d6a31c4d206cca170862c9
-
Filesize
198B
MD55113101c8e5a51594de5a595fc30d114
SHA18a70b8e7ffbd2ed406ac8bafa2fd1bfffbcc50a8
SHA256ae2928df041f91b4466e9da7c54e724f12f963004f0acade8d580fba838fff10
SHA51260ce61fa2508d1779ec64d62805e2a44a7b3a0e89fa5c673153e2e9e67a2836916c8dd413557cdde98bb1a6b25da50a9e98dface0ed4482f37c24d45544bd122
-
Filesize
198B
MD5b2ab22cf809b78c93fc03e472cbf83c1
SHA164c4cb36242937b573f82ea1edff5f01d6faccaf
SHA256394b5588e7480cd7bbd9d4921b22c8554bf5ed3332dd223e985febd5414ac8f1
SHA51264ff5fcab11d612ed18188c57139787aa2582354a1987c23e76466ad814d38440c00a8f1e5ca6b2393ed96f7c90586f7a974256f939db7bcc6e9e7225388063e
-
Filesize
52B
MD5cfeb4860a15690767e19b00cfe8cfd3f
SHA1ac70a9a8afd9c0951008f81b6f5bed323034e5d7
SHA256b9e4964da41810367f1966b6ff67a6befd2dea71f8b3c07d402bdcc51d67a280
SHA512e88dcfb0360c3ce9d0344a3873d28695aff8e24ceff3cbd56e026ba567e3dbff1243a819790c96de9f75c4932bfee06555d48dd63920479d6e636a9777a0ac6a
-
Filesize
43B
MD53a9c16a0385346726e39624d861357ef
SHA130ee430a7e360a80d8a6fee13227ec0322ff5a62
SHA25616d718c4a2de89bcfa94f30f9ce6581cf0bfd4e4ac72465ded3cdbcfd703ff1b
SHA5128b762b2f8d25b8cd19acdaf19f5b646e8fdd3a4e483e73795a15ea852b9c1a7e2de0539e09e92d6fb42ba98fc16e1834406ccc94b9aecb21b1831eba3c1ff820
-
Filesize
242B
MD515a522964876e9434f24af4a0ad693c2
SHA18efbbe9eaaaf793e6e472186eb42fe0b5eec786a
SHA256a1ded9069fed3bf81a54ae24a1e32705ec73ab7a91d41295d35340e905b2fd08
SHA512bc8570e5e53c8ffadbe139677559b264b556e1b849ee95947a654693447797e50e9e4d450450b5cbeedebca0035109c623a3404c22a409cf4d3b51ea50958e24
-
Filesize
888B
MD5a1d0c738dadfbfd3e5935463bf72baae
SHA147e4014e7d9fc6d8d20540c976870c30931862c6
SHA256c694d6684abddfc006d7fb13f302d703518310e742d675b65127573e4f4f5225
SHA512da672441b4198bb57d48f8fc8bd8f8e0079a5a60f371cc09615aa0743a16f5dfab4d19e0d018bb46fec7a483100588ce42e0d713e8caa43071a0fb4597c4d3a0
-
Filesize
8KB
MD5da95d06b7a94e7fc5d108d08eefba248
SHA12a27143a95a08c896adfbcecc2bcde7f00b57d3f
SHA256dcb63e0596f5c1b31a1f8f66f4419a6aacdf3e5f2b2b73b55d781e33f53bf322
SHA512b3dee64e08285b015bcac25ac9ac7479938771a2c63eb106794eb0dde9df6298fb82662c72e8249a10a8ebfa6bbcf0dad9bd390bc5637221509157abc535d297
-
Filesize
944KB
MD5fc6fb24fe1269f41a9b7646896852a9c
SHA125d7b1546a17e9e25693c75e09596142bccf1299
SHA256ffe585888146f2e743adfb0a84c8e9a1d82305406992fac615bbdb89323c228b
SHA5125d2256c0552ed9f8253494d7211509e298a9183bb0e4b665077bf77b2efca88dad4117b05c3cd22a2bed537bfce7a338fd4aedcddc5856d1abe16125fc27c937
-
C:\Users\Admin\AppData\Local\Temp\IF{3448C929-FB61-4C31-A697-FA7ADEC22B15}\setupConfiguration.archive
Filesize9KB
MD508b854ae71bdcbcfb23a19e3f01bc403
SHA1fc823a6d4a1987c97bd3d1084f3ed61c9d82209d
SHA2560ba6f16a21daec4c1f0419a8dd87430c8eec3cf8e89eab034e46a6c062ba5097
SHA5124be5758885ed59b840a8ab94247e2370c76227c42d31e960dc674301f4ba6e7e1d63f23be2de953cd36e68e1fb777eab3c2ea0371c6b0d0551c6fb40e978518f
-
Filesize
4KB
MD53c067f9a21e29674f1d0c1a4418c0152
SHA13e88dfa52983d2289f3eb60d92f7c9c958bb568c
SHA25640a1fe4e6486384fda7e4d1a86582c3b324521c6f07b2b9955e5bbc2f2395b88
SHA512bedccbef15658dad63af408002514c120bf573e34b7409116e552ad4eb7c7feb7e419f95c2acc9b25bb5034d3e2ebc3562d7268a308d95eb185268a00d681094
-
Filesize
2KB
MD52922d0c758d9c3c10cbdc59f91979d0c
SHA1feb69bdf58d06cca776db63036811af0764ca013
SHA25620f6d12eac29bd6ddc6a99dd276c5e200fac25c976ab4293195b58ec164c253f
SHA512d15e888bae4e23ce5d61becc3c47d9b5f61fbbe4612cf90677314570fe1df1f4fde6c519b789ad46cc50d19c2b3701bc9bd968e85bb618fb7127950d4ae92695
-
Filesize
198B
MD5d3d2855ed20df92c0e26ed21d0da03b2
SHA15071a56e2533725a0d9a906247ecac021adf9486
SHA2568e2a2e6b1a08e5e7bae2dbce4abba784cac9f374892baada730cf2e97b230983
SHA51219b2723551890fae82e21003300388ab9152713b7e72b1cc36bbbc02db32975556540aa9917556dd53bc1341186a6ce9c743e2156d39b78f7a15bb281ac91347
-
Filesize
198B
MD581e4cdf64b6980cbf90191135ae11fa3
SHA1503a332ecb738d202af299b34616bca372bdb9ab
SHA2565655490906185787a17fcf8a436c591569031e34964ba4dc423d114c0c641549
SHA51274af16e493631a9271603681bded7b9950434c57213e0dcc5b366ab5b591c58efcc836b146a866d0cd34b025a6b8eebee47f6ecb0f8242ac6ca4f8ab6e60524b
-
Filesize
198B
MD582c3e8aafe10c38ae48358dc6e1403f7
SHA103bf98c6ec968ea327c183ee5550113caa11e8a7
SHA256fb0db5887fe4dc7e599b2470a56b5b5b2af1c64c90402383b4e4e74ae61b883d
SHA512644347efaf1418a9b9579fc466ad04f53be80666cac9c39b60c136d8502a0d46efb3c5cb7b3e02f3c218a884165972f4133468693739255c41360a3f2cffdf54
-
Filesize
198B
MD5f325aa10a2e7aeeda3db09cc92f3f5c1
SHA11cff84299294a629f879c3e4655a3e5bf23875f5
SHA256eed460430976bc330858d4b3436d2424857924df2e09ff76121498c31a369732
SHA5121c889e39039346b44abc5fcc6dac1175397219fe70fa5f4126fabe5a1544898cb672d6f5691312ecc70f809d9a7e50be3a0d6a130291b474410bc06344a960b4
-
Filesize
198B
MD5b15446d53b6b1c90c109f7245cabe9d3
SHA1e878f2b793513ea5975e0f6ca0a33354f107490f
SHA25610f6d10c469dbeff3c969c151007d823df49a96de34cf210d637d249993057fb
SHA51221ec2453f3af329acd2844bd5d1b00f49818a40c5ebce63c2dfe2b2e3405cbee838744a7307d57b9c900521ad9443826022ef5ea8c38a996c6cf7b6d750ab6e2
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
198B
MD5ed51c2164003ea60f80c182c6ba110b6
SHA18c04a867790efcd17fa93d607da7e1b236b81aae
SHA256a10fdbb6a5806aca2d7b6149d891f2da08b147e9d3fe238bd27bbd6ae5086340
SHA512525049a74c81c3bb83667821cb919c6849cd23db9c24230cc9fdf3ace1b5a65911f2a5e582661f87e6f150f645668972bc3993ef8e0b1578fd1e250ee510af76
-
Filesize
198B
MD530c8d07458a5af684bd78e40c1bfa544
SHA11ce93ce71e19fe6416c15471262ca90c113ccf75
SHA2560bb4525006708d03bc67df11998d46b2ec95a76b609ac32d03fc90338ce32992
SHA5124fee7d2f66bd0fd06509533bcbc64f36875335c0fdfb15b16c7c44bff550decead8ef78d79f8b869b913eda6874f24782b8c78c883b49a571afb3c6233b5046e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\AlternateServices.bin
Filesize12KB
MD5cc6a6eda5540ab1d8d7a0ab38acb1062
SHA15f1ba0525b089ff8543774f971fce503283c0086
SHA2563bc02dabf955a28a8a003f41084a78b37193ea09c28ff8b56c88875582303e97
SHA512eaf2a95e9a466d373312112b73b60694925ebb0ff4ea4cb3e6071b8c36643a90ac9afbf4b3b172225825cc938831f3206147f23fd7cf3fb30d03f5db5a87ff09
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\AlternateServices.bin
Filesize8KB
MD5bca7b680f0310bf5f58719ba000758c7
SHA1c44f1abe75920ecff235714b81ce282cd36574e2
SHA25641079848cdf5d4db0eb9b32da76d430c92b88d373887caf1dac69b3bad4f9435
SHA5129a8d858ac9e20bd2e4444b842663f94bafdca147465a98bb7a93e5b9ad24b8a2b590dc525dce70d417638134de5497c3b81aa05cc0180f8fd0fc7eb25b83c5a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\SiteSecurityServiceState.bin
Filesize1KB
MD574f9ed97491b274a49de7fae40e58ec6
SHA12447632f9a5bbe713b0af83881f1967de9ddc666
SHA256f60bfbd1d944f5edc1642d29a78eb7fd8aa18b94145dd7eabc3696d60936518e
SHA5128a104bdfde470f9a5851188dcc48e780e2e1c724b4423c3ace9d56a83ebfda38dcc7b23b60bfcfa19da8bb51fdda85d65dd5c079fee5f87417972e317caf3fb6
-
Filesize
224KB
MD5d806941abb137bd8acf7b0fa0709ed69
SHA154f4c1cfc74684917bc2e8cc15206463c3e11eb3
SHA25649abae253b77c3ae422c71fe49897de8027d84ec0a64983b0d3fa983cdf50c1c
SHA5122cb71661bef2557359c1045dd8135a611f7a0b967542ee2573554fc1f411fe267b1be72fe3ebfe8fd5591c10f28987f1b27143a9eef0698da1d0c0419109462d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\content-prefs.sqlite
Filesize256KB
MD5b5acd9cf58ba89e643e7b2e839e0707e
SHA182c2b9cbea4acb50b446b786818287be7b0b8b61
SHA2564d4fd87f1cdccc9f826ab7de2b3980db6fe4ed328f079ceb24f680557da9667e
SHA5121fdaf5173a2fa956e3793b3643b44d928a4c81a1599bdf4b057396bfca5948ce1097194dbb5f528959c8cf4e34d058922828236c6060b41510e9ea2cb9ed424b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.bin
Filesize42KB
MD589c811b25b49e825d0837c25370190cf
SHA1c1bb7c7e7c08c8d6115e0948303d074ffd754fa4
SHA25654c17a2802c6c083e3894ac8d3a59fd1a12002a0e10497ab39d5d6b90960ed37
SHA512ef5e051f5e6447b867f3b4905015e31e1cc7f97bd945c04ed4fdc749b3322c1c88aecc858bf7da05ebecad101270be75381f5cad9421c74f85365bd3bc96b3fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD558a493b7aea4393939d289860be66b0a
SHA11e0ad384385b135129cb17ece411112fb88e12ec
SHA25665feb35a1e5843d62341db787349e22fc70eff3ff264e9ac9764f6114ee663b9
SHA512337763e79742b12848b0f8431a416461a8fc059b45bab2506544b22e71392eb8827bc23c1a32a9881f5427511feb57d414f9612c116473a3ea765757b57e2bb2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize40KB
MD53fab36f3f01bbaa9c03d31a876a1bdd0
SHA1c39c1f080659ccb0597177c1f5332f29527a42f3
SHA2563abf5fa838d90e9caf87acf63e4fefef6829711c52697ea53f7e1440269b6c54
SHA51264beddeb985b371d9412d1b90fc0f2ef5043ada1ef74206ce14f10e24796a7bfe144f6afb1871ea70aa85845fbd434d8df61549b8b540a364a022a6863912a35
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD58ad6e40872680878d55f1ac8db3f721d
SHA105330e8528e080f151f2065aec72179fc8484df3
SHA256b6906f4d90e03b0a2114ac793d46d58a4dc8288aef1b5d767df885a83f1dd022
SHA51247a9c762d4ba4d453b10b101e772202a6608b3120823a575eb39563a79e871130169dd2befb35cc50894f0f162eff602ea938fa7a99d099453a0376bdeb6a423
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize30KB
MD5337e363d400d691c64ddb1fb4e2d2093
SHA174236da052a5017bff83e0db0a67e9089de0b941
SHA256533298517fed8b5533b98a6f065fbccd2f9dab94ea570d5c116842295a5d202c
SHA5123fd1a49444514141e60f425f6fc6b62506eb6f9b2260874ef0a2c767080fc1ffb263e31a71e609c72b163f86523cd55df7de7d5f300cce3cb0762760b9017825
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize41KB
MD54bd30d1715ec078414dce0a2b3f493b4
SHA130d8cb5dfb6660ffc5ffc4979e57e2da36ba4414
SHA2569f0ac6bf016a52cf97f9ba2c99dfafdab2281e98b73ba5b3e769c02befeb77df
SHA51275861532b065026a5436a71dc7f89e77f41554b562d11c82ccfc4546115cd379bf2b74861f91b18d2b070679d39965f8e07969925ca6607ad541d93d16389b59
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize41KB
MD50c67962662f566c24de2cb6914b65d0b
SHA14a6eed4e147ce28abcd3d2b446f90ada1dbf89e6
SHA256006c6f1dd7b1a63bcaf74a00852ffe23fa829805881aef84f20e861ef848587b
SHA512a4b73510925dd87ea6fbc00cc8a1e008f6a1fd8de3d2ef4f2752f6e4afef6412763770e4cf580e74050a5224214c004f7733acb47ea71be90e5ad2607ac7de80
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize32KB
MD5931e7d811beb2fc69b6a7a4804ca8d64
SHA1710829e6bf3bcaf3c3076c77ee0893d7112e0cb8
SHA2568f632cac95aafdec75543adbc78110ce891dd71eff5221268c52b9b5f12c37bf
SHA5129c6173af82584999d4a632088ae0c9cf4b13e346af7777b4a2f2c6cc92079fd7e0026f99bd9f9c19851cd632a4128b2ed2010219f026a6d5be29febd645b5083
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD540f629f45415a9dcb9470cd72570ad6f
SHA1b076270f4fad630180b2381ae76b9c2b3c389445
SHA256b33e9b2de2daf0a52986751058aa4ed49eda7e7fc2bbec15deb65bbb16449009
SHA5127e72d68151015410c9b1f02a33db6917e24cf51e72d70de3a2bde2eee25d5f00ea245dfdb7776b8bcdf27137a7d1cd169b11753da56a4eb279d60fc2902562fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\events\events
Filesize770B
MD505be953fa1afb42250c61e3b85be972a
SHA141becf8e88ddd416603f8e9a7b1b4d27c6781aec
SHA256d1fc5933379f68b4cd0c105c4ebb0530bccafcb64e450627a659d97beb4dce9f
SHA5120d4a49cdde941dea2b3e57377a041137c6e34a010ba397b07fbfa749ed30be4cc5398d51ee84a0e0e4b6971c66783b39ab5972a119559190e367bb6182d28b84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\events\pageload
Filesize378B
MD5a6cc734dbe77766fc843468222215c42
SHA1a4cae4f55c29fdaf2d4d0edf2a9cfa89ff0efd4c
SHA256080da779b03bd7cc81938778c55957c0c05de192bb8a6ef2b49a17442070942a
SHA51286769fb73271a68ef02d362b7dec3a7b9c628113bf6f52bdb0d98b9ade7d95ca089e9cc29ad892cf46120b5e7d414d5f4d56d38241b60ff86f9f2f87a30814ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\0985cef5-a03b-4f47-92db-bdecd0284f11
Filesize671B
MD5929b3833d64e1b7088de2271bc5455c4
SHA14589b8b294e3e8885d720af7fb27535302340c91
SHA256be17dab787505310df3e9e65d6917b4228d7c9ce2f8418f446838ea649cc20c0
SHA512fd399a0554b872d119184c74e8508245613a71cbf0c0e17cd663004e62362cd55077256c399fa4215fcd810462d0bca51f256b10f3881dd99ffe0819222fce30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\1af2959e-3433-4a3d-b205-32b37078740b
Filesize734B
MD5d547b5358aa51427f661406d091df115
SHA1862856d5aeb14d0f6c93f52eca77e0cf79a7cc0c
SHA25689d4dc347bf82f4a2cde9414b7109018002b3f9a47c74feddef5cfd8ad4d3462
SHA51293871a4249560b0c79620d6ec5c2244e38e8013bfffece19c35f8bbbac6a872d32acf0d7735580e8eca185cb9ca53d9717dcf550694efcb926fca53569a80305
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\8a0ab177-eeb8-48ac-b91a-31f2430708a8
Filesize768B
MD5ab16dec6a3c2a36dfbe0d5ba67afc34c
SHA1887d6b086ba9b2fb95c1ed7a915c305a3151592b
SHA256eacf30b32e96588055d496fdd17717012ec80160f1a4e2e4c8ed0308f727daef
SHA51222df5ebc0ec5a9854eb460ddf14dbceaba8feea8be2e956f369ccaeef66249d2c0574a13bd0e763bb6829febeaf0547372a4beb45dc653139e098573b100705f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\9430aac4-f3e5-4481-953f-132e44fc5313
Filesize1KB
MD57c43a4f23e10fd727658ac89c2a414eb
SHA1aa1bd0aca3d01c159d18e60d43cdc7887ab6215e
SHA2563c9cf9227f6be5d028713995259f373261f7f943be7ab287b47d1dc47f02ea1c
SHA512100929092dc54bf2ccd8c7963dd62a208afcffd3d3a1d6c0ff82c4a2eb622a387cbceaa9e6824fed65d189d25e2cf5b847ed99784cac932a8477f89c49818e6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\9b9dadb7-a93b-4c4e-b433-9913649a628a
Filesize982B
MD5577d4b73370d4a9f4ae807648b5c3046
SHA1a7127fd9210ab9daede64c5718fcd6d11ed9ba7a
SHA2562b4a414fd8aa3ef4ca18324637b96af4744e3100de2b8fdd38fb39db400ceee4
SHA5124b4565912f2ce210d383426fe8545c1bdba61e031d159968e7edd5435c4caef82c2ed18f0577148cb768f4c756235e958339caf829bb10d0b28c287aa32e94cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\a0076e68-bc64-429e-ae5b-ac9ead5505ab
Filesize16KB
MD57aa6d9c0bcdc31f6f53f475f0296ecdf
SHA1fa96e1b33da04ac2849ac18d8d655b69bb2ebbd2
SHA256a86b487d57bbba369e0dcd4a110b7f4f7d3ab37b6c5e58a03e8df4749d030ce1
SHA512042a80f664439f6e3e0cbd65ad8d24ccd077d10d452b2603295f55aba1ff06de4ae7ee84214f14441e675dbc52414934e0e122692f325c526e6a584d53fdef38
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\b33c469b-7783-4da4-8e08-f44396f3405f
Filesize26KB
MD5e88af5a4731e0cd413e78da51258a496
SHA17f5dedf95c1c61ef47817b1ef8c3d27720db4971
SHA2564fcdc8e1fd185b7b0d27538a49e1bb2e05ea265344b930976108f346f56a3d55
SHA51226dc209346fcd7528368ba46e6f7c71ccdd450fe72013f92477c72757ffb54d6298509a194e51bddfa7a8b58ba2955792a76ccc391214765fa1e3109599549e2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\ce468d66-4056-4d03-a6b0-a084c4c55e77
Filesize5KB
MD54af95b3ed0c98288e76e3450ac12becd
SHA133e0ca425d14c2976936118c1ff5baa7e1e0cc04
SHA256c86704d09678dda52f7f4f034e615d0b12f90c4409ae029eaf958606ad14c1c6
SHA5125200f55866811940352f1ae596ccc31e51c816841e000a3b3a978703fb0733a2ea63f21d7b5b7c3b00733a85dafdc96054814be47cd34b9620da68c0c2b0ee42
-
Filesize
37KB
MD5073d549f451a5841fe427e8feb9251b3
SHA1312f55f6b83aadc4a816d83d67a2fd527ab2410c
SHA25602016e975b4ee937add626c43c47845527985c0eb7b3b6a45a7474557e8443d2
SHA51233fd4f3b92b41b50b85c78488fbbac59e3ed54db7f0ff9fb8f77919ac18e4e2d40756d9dd8906c656f26752d8e9306d7ae97b9bc46d05653b6b79d073d07ee5f
-
Filesize
5.0MB
MD50211e804b2cda9122b5d826841061145
SHA106aa8c12363efcb2acbdf74de2d077879be2fefd
SHA25687d069fad55713edfc34f45ba8d0cdea215859bb52b0c96c3581979e03da8af9
SHA512117c34b5a35a4cc03641725cfcb8628befc47dcfc7ea1d9e4d58508e33aeffae03d206d5a8c046eb891c9014e8c043b1a4e681320cc24c7be597241792c91e10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
96KB
MD54379069d2aabe032c508ec937a91dd12
SHA13ea8ebd49492c4c2839dd945fc3f73a9a2be1cad
SHA256d654890ca48a8df68567203289941d927947d576cbdee4666dd4269daff6a2c9
SHA512b803b70652520ed8018af1fb5009ae096bdfb7e94554b0a15640a3e62bbded016c840546cbbc79e315ce78cd49875f2c5bb4197d36b199b45c4496f55ad9b927
-
Filesize
5.0MB
MD529b94663a21304aa95a9e338197b7a8a
SHA1dc08a47d4fd5bbc0695689f8bedc92a38143a623
SHA25625fe2eaed848302ab3f5728a72c36600da126c2621698661a46e7be2b71bb291
SHA512e880b8a9b31bd8589eeb88bdf540dc154b66b25c3fb434a25daaafd8a2b10cab0ce10bce75e6b71f84cd9e60ed8382c6c46a9f9d5fe48120089f0e2d3dcfcbe4
-
Filesize
5.0MB
MD5452fecd248d3016dc365fea4906dc194
SHA14bda75193d5980e172a6bc4b6e5f8abd1b89bf7a
SHA256d5da5d389feed232879f2a5a20a9cf6ee8b1967ed2e154f0eae834c1c34125e9
SHA512c73b949c3b4a24e1164c8e932cd992450d64112338c8d341eb79a32258969a711c9e9e1340f7c02eeee065d711e0a36806a1c332e3312e032794363fd7ba47a4
-
Filesize
11KB
MD5e8d0a6b55d679fa357e6846d1fa18cc4
SHA187fd424766f6ef6d6cb1077a3a50a71103ce4531
SHA2562e31afb807a1a095d849697868285b34cbb5e4c511fc693dcb68c3997745ae29
SHA51265c46b77f92199c4b99889450be9bdc0c85980aff53d81fb472c5e99b082c0baf37ddcaa70e5f7c7d8adb34a0bf9b3fd12f7239e25f4511445bac229e61614bd
-
Filesize
10KB
MD57f85a0c55904bd10d0f6c251de4b2d4f
SHA1ed944c3cb3943af193a27b4b33a836af1559a281
SHA2561e3130c105eb58b3ba0aa82311ce7fef0f4ff7a805df25a95c1c5b2a7a2b0fee
SHA512061c71fd46755c1dbdc7c22991ff5f6889dc8bb596a84eb747a0b9c4fa536d036c76bef6f0fb31719068634e93994496263e70cd9f650d75b9718dfd14449776
-
Filesize
9KB
MD507e967e97c0d399a9afd035633d1a689
SHA14745b9c02f20d6d34c1ebf85f85ffc84837d3e9a
SHA256750d73fc1a58f857a3a6a89cd76cc37c0771e5a91c6e3c8a2ec7e3fea5f029bb
SHA512fc9abc412cf34349cb6f35220fccd75faa1f814fc4a57033129d3bcbc7029ad1cfaf96e4a9b951db47463f70fddfbe2bcdc64e62d6b55621c13f5956e2286bf8
-
Filesize
11KB
MD541f1398e2e4742bfa8bd5910ca587a46
SHA1315318ed234f984a72cf2b8083e4231b5900d57c
SHA256389b0693d75f4d6d93f7211eca1c08ae237432836910aca47b807a4c71e1d8be
SHA5122ec7f08f63f436ebe55b3d27ebfccf2f3ead09849a01aea623f401aa2cd057e75fbbbcb37e0e0e89cb4471d2002e16a69f3b623fdc43046aaa70b73d226a107b
-
Filesize
9KB
MD56d76b58d2c6ba3740b0ba507a7a3a3ac
SHA1ba6d23b264b2a973905377aff867bc42fbe7d46f
SHA256d3980334996f701efc4651f77d7b387b040a67255936e845b2b31b219b49eee3
SHA512a5289fcd0c6867526a39efbc91e8cd81ef9c96ba78350e5c30efee782376b82b0808181dbec22b8dd30b2c839b9ad01c1d00f77877fb5b7f51e1338457d86fb5
-
Filesize
10KB
MD54bcac2930399df299cd99b5d639eabaf
SHA10864b0a89ce32214dfe1a64d252405b5720a4dd5
SHA25612ca29f5cc616ff343d2e0fdb17922eddbc4c3b267c8d233cf316dd296cb905f
SHA512d43d69836646b5e60b6fa18f9ef6b3f3cd1282839af71c5fa8bb578a173ec30a13aecd46f883389f597dd989d6e5e75b1e020ccc3ffe617d8f8fca6aac617af5
-
Filesize
64KB
MD576786a4c0dd19d88d6d3ed95a293bf2f
SHA1b0d6d676127a7694fc6e71ee57fcc2ffaa621ff7
SHA2561a2564c1ba20b8038d35c2319258d94dc15d97914dcf753b31c48b79940dfd31
SHA5128cd3298e2ebba763d3c80ac4b17e44af7eb63b46304967d0c6316d314baf8611c05f7b9979c2c5c329ac167aea0246e8c9f057ffbb272481c13fd5e4b4bcb2d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionCheckpoints.json
Filesize228B
MD5a0821bc1a142e3b5bca852e1090c9f2c
SHA1e51beb8731e990129d965ddb60530d198c73825f
SHA256db037b650f36ff45da5df59bc07b0c5948f9e9b7b148ead4454ab84cb04fd0e2
SHA512997528e2ecd24a7e697d95cd1a2a7de46a3d80b37fd67fac4fb0da0db756b60a24648b7074255dc38f7651302f70894a53c3d789f3d7cd9f80fb91bd0cade4be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionCheckpoints.json
Filesize288B
MD5948a7403e323297c6bb8a5c791b42866
SHA188a555717e8a4a33eccfb7d47a2a4aa31038f9c0
SHA2562fca1f29b73dd5b4159fa1eb16e69276482f5224ba7d2219a547039129a51f0e
SHA51217e2f65c33f47c8bb4beca31db2aff3d4bbb6c2d36924057f9f847e207bdcb85ffcbb32c80dd06862ffc9b7f0bd3f5e2e65b48bb1bc3363732751101d5596b1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionCheckpoints.json
Filesize146B
MD565690c43c42921410ec8043e34f09079
SHA1362add4dbd0c978ae222a354a4e8d35563da14b4
SHA2567343d5a46e2fca762305a4f85c45484a49c1607ede8e8c4bd12bedd2327edb8d
SHA512c0208d51cf1586e75f22764b82c48ecbb42c1ff54aa412a85af13d686e0119b4e49e98450d25c70e3792d3b9c2cda0c5ab0c6931ebaf548693bb970a35ae62b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionCheckpoints.json
Filesize122B
MD599601438ae1349b653fcd00278943f90
SHA18958d05e9362f6f0f3b616f7bfd0aeb5d37967c9
SHA25672d74b596f7fc079d15431b51ce565a6465a40f5897682a94a3f1dd19b07959a
SHA512ffa863d5d6af4a48aadc5c92df4781d3aacbf5d91b43b5e68569952ffec513ff95655b3e54c2161fe27d2274dd4778bad517c7a3972f206381ef292808628c55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD51f6a859ec7b8c8c7d145b5b63ed1077d
SHA1ca3bdb8cf7b6c6a34e364c8066e1b69e8dac1544
SHA256a7541fe80cac795d01771346e4193146dfbcc6dfdf6163a846c718e7bacd9d99
SHA512fc73120e94d458d2b3a3c93023dc358afa62110615598ec0e918fbd4b631f95617401c4e12c42ef96981994eba68806abb525d18ff8529a5fe9a710b9e149247
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize15KB
MD5db611a242136cccdb314dd179db8b29f
SHA134873f14c0c5cbdc8e9e922738245c094eeb3806
SHA256885b4f6d5d12324a4b90d504c41b42f1856b803852b588b4e35a39936f5c0a2e
SHA512f18e090a7f29af548743eb71646a3e1206d3ee740e2e3109ae8c41cf6882204aed71c8d602f6acaaef0d9a4f03ab98056e778776cb78bb5514be9fba8a0908c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize25KB
MD5d84abd08f71658f1c1b5c9fafae700e6
SHA1c45f2b9fce008dd31416aebe744f90367b070555
SHA256df7f861443cc49a526406506ab0342e058ffdb28d960f5b0587c5ff777519c99
SHA5125c2c325de55367bbf68222546192ecf467f01f510b57d84ed2b1ac081be761eb2775714d04d2de72b5afbb323bf46ad014c4d27da474d31979193f5155f6606e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize18KB
MD514bb816e2b8c2c7623ffc6beace4a4e3
SHA1477b2d9aefa82054e2acc2ffd0fc0971c17f9261
SHA2562186cdd4bba65d6ce9cba2d8bf7cb9edf0afbeb5ebb5054fb91ce91afcbb9c99
SHA512f02da31516339f51a7784f8515bb4077f15413a67f64440bc2ff0db8ed7e1282d7c8b48955950228d5b23cf3269030308ded041a17ec5a1f084ffcdf6b24bba4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore.jsonlz4
Filesize14KB
MD5bf85a8579db0e7e5af5aa120840bd090
SHA147085512d3bedebc9218105f7e485506eb061b3e
SHA256526117d81174bd65c751c388b07f2cbf211c1bc879982d96441c692097fecbf4
SHA512b2653241ca517c106f5ee601e46491ad6d46881e570feee707bba25ef14c98c54eee95e693ee21dbf5b90479ab99ac2f6174f15f43dba542c6baee50d724877e
-
Filesize
4KB
MD523605e20ec7b9c605b210ac3996e7a62
SHA1e01d89d33f05c4e7ef9eb63d1487b297b420ac86
SHA2561387ad3f14749464f83e64bff542db5bdb73d1ec9a6556bbf3041d943a7e3003
SHA51263f6a0102efd24da5fd50b0fc6ff00da33baf2cf3cd2fb1596e6293aaf551ec41b2ddda9b868f606c3c7269132e282d06d3c815b75d71ed9c2e46354ce588450
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\storage\default\https+++www.googletagmanager.com^partitionKey=%28https%2Copera.com%29\cache\morgue\238\{7b712c4b-1e4b-426d-b6ba-d1a2370299ee}.final
Filesize11KB
MD505c18239955961946a0e350a0aeb5c4d
SHA13f53dfdf9c6d62dbdf8fa6b21000bc5c6f11ba30
SHA2569dfec5190a701ec16569eeef1024ee3cd8502ffc96ae484375df9c1d3dbf166e
SHA5123b1363b17bea7e3c9095427ac65fbacb624e09d1ab3a37f7e4ee7abcf7fd1b8ac93c5050ae644ad404f5de01a414892aece1ae0132f2f4f8ce6856fdb5114e3d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite
Filesize48KB
MD5d46c861c46531485431dddcdb421a0d5
SHA1dd09aa313d3496dee3fe3e6c847c5556eff32762
SHA256f4a4b9c4b1a98728fd04b328b3c83e4d5d296f4a015aeb28b8d60fd93a429959
SHA512a14d5a47754aa2f1d1a02abca808cf45deedba9b097da3c108fcb3aeaa0ede33a8457815ff9325bc975d89faba7137f86b30773c156155f13b8c8a77f9880dfe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize656KB
MD58574b129d467719eeb65fc57e342bb8d
SHA1679d965509e1af7ac69bf217d56d0c4def800645
SHA256215e864964c32bb33424d32e6299783d749682ea810260bfc64a565820a2636a
SHA51249b63bc0b2403c18746e41a161ea52314d2ac193e72ad63c023b32d2e26df4cad9839e5a659e2ccf9701cb754c0cc1f50e3e8c9249313b94011bca97dd6ac4dd
-
Filesize
120B
MD58d689c06cb844185099c0398a280537e
SHA157073c7526ec37e94bb9db44fedc6d50276f7a6b
SHA25696729e9b38f216605ff10715f96f364be32f02e2de23ede7e74b78244605124d
SHA5123c7df326c695143915df1068cb2c0f58e93e4881b2c4d94b33948b80e954fbd4cf944ae53b4d15002b79fcdb8e88f8e9cf4c89ca50f56b7cfd8a13ea7dd6fff8
-
Filesize
1.3MB
MD5367a557eb37b66fcdd1e2bf660f4179e
SHA15c40c30b687e7a17debf81f632117f27445e0cb2
SHA25621c86774603b796062a9eea7f3b109455de083e08dc7f2c91cf17b49796e1e9d
SHA5129c2eb69b93ea437a8fe244708505ba5d4c9b8eca91b18227becfe860a2c1e9d40a858be07849ce51f31e64e8121b63dda449209041766d9fdc35fa8076dcca4b