Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
428s -
max time network
430s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06/03/2025, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
SchoolBoy Runaway.exe
Resource
win10ltsc2021-20250217-en
Errors
General
-
Target
SchoolBoy Runaway.exe
-
Size
635KB
-
MD5
c66114e4978c9d4471f950928b0e2f9d
-
SHA1
1dee05ddcbf6f449d07e5f82a8bedd5c5e5452f9
-
SHA256
a8683d722ba537caef48839be7a454fcb9a190aaa06c092daa5e9f92686b35db
-
SHA512
e066d1a3061b50ad0d1420c2813069d6843920e6262f9ececa35a4a066f31060c51ccb5ea2caf59e39de3f3752fdf291b7725fb01abe2d73f1324125fbe4a563
-
SSDEEP
12288:UKQGzu2BFhnkCYEABNdL7urYP1DqcKoYRC3zC12KZvIZX:UKZkD3L7urYP1DtKoYRCQ2KZvE
Malware Config
Extracted
https://erpoweredent.at/3/zte.dll
Extracted
danabot
51.178.195.151
51.222.39.81
149.255.35.125
38.68.50.179
51.77.7.204
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Danabot family
-
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
resource yara_rule behavioral1/files/0x0012000000027c15-1108.dat family_danabot -
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2116 2204 rundll32.exe 110 -
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral1/files/0x00090000000280d5-1301.dat mimikatz -
Blocklisted process makes network request 3 IoCs
flow pid Process 286 544 rundll32.exe 290 544 rundll32.exe 361 544 rundll32.exe -
resource yara_rule behavioral1/files/0x00080000000280c3-1077.dat office_xlm_macros -
Executes dropped EXE 1 IoCs
pid Process 2388 5050.tmp -
Loads dropped DLL 8 IoCs
pid Process 4264 regsvr32.exe 4264 regsvr32.exe 544 rundll32.exe 544 rundll32.exe 776 rundll32.exe 1924 rundll32.exe 4120 rundll32.exe 896 rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: EXCEL.EXE File opened (read-only) \??\B: EXCEL.EXE File opened (read-only) \??\D: EXCEL.EXE File opened (read-only) \??\G: EXCEL.EXE File opened (read-only) \??\L: EXCEL.EXE File opened (read-only) \??\O: EXCEL.EXE File opened (read-only) \??\R: EXCEL.EXE File opened (read-only) \??\T: EXCEL.EXE File opened (read-only) \??\H: EXCEL.EXE File opened (read-only) \??\I: EXCEL.EXE File opened (read-only) \??\J: EXCEL.EXE File opened (read-only) \??\P: EXCEL.EXE File opened (read-only) \??\Q: EXCEL.EXE File opened (read-only) \??\U: EXCEL.EXE File opened (read-only) \??\V: EXCEL.EXE File opened (read-only) \??\X: EXCEL.EXE File opened (read-only) \??\M: EXCEL.EXE File opened (read-only) \??\N: EXCEL.EXE File opened (read-only) \??\S: EXCEL.EXE File opened (read-only) \??\Y: EXCEL.EXE File opened (read-only) \??\Z: EXCEL.EXE File opened (read-only) \??\K: EXCEL.EXE File opened (read-only) \??\W: EXCEL.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Petya.A.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\infpub.dat BadRabbit.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\cscc.dat rundll32.exe File created C:\Windows\dispci.exe rundll32.exe File created C:\Windows\infpub.dat BadRabbit.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\infpub.dat BadRabbit.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File opened for modification C:\Windows\5050.tmp rundll32.exe File created C:\Windows\infpub.dat BadRabbit.exe File opened for modification C:\Windows\infpub.dat rundll32.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{283C4888-31E3-4E32-8664-812F6D235F34}\8tr.exe:Zone.Identifier WINWORD.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 4688 3996 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BadRabbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DanaBot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BadRabbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BadRabbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BadRabbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Petya.A.exe -
Checks processor information in registry 2 TTPs 21 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000_Classes\Local Settings firefox.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{283C4888-31E3-4E32-8664-812F6D235F34}\8tr.exe:Zone.Identifier WINWORD.EXE File created C:\Users\Admin\Downloads\The-MALWARE-Repo-master.zip:Zone.Identifier firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4288 schtasks.exe 4572 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 5 IoCs
pid Process 2204 EXCEL.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 2040 WINWORD.EXE 2040 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 776 rundll32.exe 776 rundll32.exe 776 rundll32.exe 776 rundll32.exe 2388 5050.tmp 2388 5050.tmp 2388 5050.tmp 2388 5050.tmp 2388 5050.tmp 2388 5050.tmp 1924 rundll32.exe 1924 rundll32.exe 4120 rundll32.exe 4120 rundll32.exe 896 rundll32.exe 896 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2000 firefox.exe Token: SeDebugPrivilege 2000 firefox.exe Token: SeDebugPrivilege 2000 firefox.exe Token: SeDebugPrivilege 2000 firefox.exe Token: SeDebugPrivilege 2000 firefox.exe Token: SeDebugPrivilege 2000 firefox.exe Token: SeDebugPrivilege 2000 firefox.exe Token: SeShutdownPrivilege 776 rundll32.exe Token: SeDebugPrivilege 776 rundll32.exe Token: SeTcbPrivilege 776 rundll32.exe Token: SeDebugPrivilege 2388 5050.tmp Token: SeShutdownPrivilege 1924 rundll32.exe Token: SeDebugPrivilege 1924 rundll32.exe Token: SeTcbPrivilege 1924 rundll32.exe Token: SeShutdownPrivilege 4120 rundll32.exe Token: SeDebugPrivilege 4120 rundll32.exe Token: SeTcbPrivilege 4120 rundll32.exe Token: SeShutdownPrivilege 896 rundll32.exe Token: SeDebugPrivilege 896 rundll32.exe Token: SeTcbPrivilege 896 rundll32.exe Token: SeShutdownPrivilege 2992 Petya.A.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
pid Process 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2000 firefox.exe 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 2204 EXCEL.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 3692 WINWORD.EXE 2040 WINWORD.EXE 2040 WINWORD.EXE 2040 WINWORD.EXE 2040 WINWORD.EXE 2040 WINWORD.EXE 2040 WINWORD.EXE 2040 WINWORD.EXE 2040 WINWORD.EXE 2040 WINWORD.EXE 2040 WINWORD.EXE 2992 Petya.A.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 416 wrote to memory of 2000 416 firefox.exe 87 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 4928 2000 firefox.exe 88 PID 2000 wrote to memory of 880 2000 firefox.exe 90 PID 2000 wrote to memory of 880 2000 firefox.exe 90 PID 2000 wrote to memory of 880 2000 firefox.exe 90 PID 2000 wrote to memory of 880 2000 firefox.exe 90 PID 2000 wrote to memory of 880 2000 firefox.exe 90 PID 2000 wrote to memory of 880 2000 firefox.exe 90 PID 2000 wrote to memory of 880 2000 firefox.exe 90 PID 2000 wrote to memory of 880 2000 firefox.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SchoolBoy Runaway.exe"C:\Users\Admin\AppData\Local\Temp\SchoolBoy Runaway.exe"1⤵PID:1960
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1956 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1864 -prefsLen 27215 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4f1221d-457e-4b42-b0c4-71b4d7dba738} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" gpu3⤵PID:4928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2364 -parentBuildID 20240401114208 -prefsHandle 2348 -prefMapHandle 2344 -prefsLen 27251 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {85b3ee67-eedf-419e-adec-52133e3319b4} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" socket3⤵
- Checks processor information in registry
PID:880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3240 -childID 1 -isForBrowser -prefsHandle 2976 -prefMapHandle 3300 -prefsLen 27392 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a405061-c394-4c59-bf4a-d5c98e78c6e6} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab3⤵PID:4288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4272 -childID 2 -isForBrowser -prefsHandle 4264 -prefMapHandle 4260 -prefsLen 32625 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87d615b3-2eed-4602-ad02-1ccfed1b3c09} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab3⤵PID:3716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4740 -prefsLen 32625 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4f89873-b9da-4e8b-9a7e-4f285a8fea75} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" utility3⤵
- Checks processor information in registry
PID:3236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5236 -childID 3 -isForBrowser -prefsHandle 5228 -prefMapHandle 5224 -prefsLen 26928 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d593aead-f7b9-47f1-8d78-90b7fefb44ba} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab3⤵PID:1240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 4 -isForBrowser -prefsHandle 5368 -prefMapHandle 5372 -prefsLen 26928 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b2ff253-69e3-4986-a25d-b37c1e4927b2} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab3⤵PID:1288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5640 -childID 5 -isForBrowser -prefsHandle 5560 -prefMapHandle 5564 -prefsLen 26928 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b06946a2-67ae-403d-b619-79ad84d01ed5} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab3⤵PID:636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4248 -childID 6 -isForBrowser -prefsHandle 4240 -prefMapHandle 3528 -prefsLen 27226 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f222078-9470-4d99-a715-b02a03eb6bd6} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab3⤵PID:3732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6060 -childID 7 -isForBrowser -prefsHandle 5320 -prefMapHandle 5324 -prefsLen 28092 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6dd9a62-7467-491d-9b68-e0d3d787f2d0} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab3⤵PID:656
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1268
-
C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\CookieClickerHack.exe"C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\CookieClickerHack.exe"1⤵PID:2256
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Browser Hijackers\BabylonToolbar.txt1⤵PID:4920
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Banking-Malware\Zloader.xlsm"1⤵
- Enumerates connected drives
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\nxTgTGh\ECeMdPT\EnVYsVZ.dll,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:2116
-
-
C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe"C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3996 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\Desktop\THE-MA~1\BANKIN~1\DanaBot.dll f1 C:\Users\Admin\Desktop\THE-MA~1\BANKIN~1\DanaBot.exe@39962⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4264 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\Desktop\THE-MA~1\BANKIN~1\DanaBot.dll,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 4682⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3996 -ip 39961⤵PID:4852
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Pony\metrofax.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3692 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:788
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2040
-
C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵
- System Location Discovery: System Language Discovery
PID:3548 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal4⤵
- System Location Discovery: System Language Discovery
PID:4712
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2737521212 && exit"3⤵
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2737521212 && exit"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4288
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 03:27:003⤵
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 03:27:004⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4572
-
-
-
C:\Windows\5050.tmp"C:\Windows\5050.tmp" \\.\pipe\{054C622B-2DB9-47EE-99C2-E17A6CEB2FE9}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\Petya.A.exe"C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\Petya.A.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2992
Network
MITRE ATT&CK Enterprise v15
Persistence
Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9
Filesize471B
MD5b5585a9f10b8e0fd8b380a1e9a08f0c6
SHA1cbfa8300c38aa4ed9f715ef7e2ba23421bf32882
SHA256abb8787788ff55c5da185930e393ef7de7fa8f60723c7b116bbab6df439f4226
SHA5121fc959a4f557b664e29ada23986eeddb3b7b98c7c903f37665c3693ba4ea0f2833883964d4c82f911f1f73f6cce97bc2361c9ce86138c2b036f674b7b5948f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9
Filesize420B
MD5aebb034f5e4b003b43dc1e2395d4c33a
SHA1318d1e3d008a5d7ae939ce82287cf5bbf00c69f9
SHA256ac113dee5fb2b781d1f27f5f1d8d6ea6a1c9c81ddd402201d27d43bc6987cb15
SHA512b9bc0d1c5ef66b35f300a78b4609872584b39c6466d3cbdd9c0206715d7c8ceca4784f4ca0acd3c2d7af22b7c83da1316491b760063f49d668d60f0c02f0ae77
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\9E37421D-E4CE-44B5-A10B-31673E0BDB15
Filesize177KB
MD580941df41ec64bd630b16be6cb1ec263
SHA18c7030530214c350d113a41ec20c0408586b50cb
SHA2565b75503c8c865ced9086b4d7846f1a2e8944e4778055df645111dc11c227c0ba
SHA512a78b128aae8f2d2b336d56711b0a5fc52b8b3b0710f20a5e2770337a406e7badecaa844509b44379bfc35f3de7977ece0ee8d43d48b5b2dbdbaff37e234638b7
-
Filesize
331KB
MD593b86dbf4b144be5b008e1cf103fc857
SHA165b7222eb6dc14a104558d62e28d4441838f1a14
SHA256fbcc86f3fee25158e3445c60f44ed208ea64fa3c2cbd175fe07c689a330a2b1f
SHA5128b3db391afafe1782937bf28caca0e5847b536bf0f846f098360a8ce59297f1a4793b96fbea1264fe19775daae4d9e5727a3f4295e82c8257ca0f705152c95bf
-
Filesize
12KB
MD532fd2401b3d5f2faf47252c587bdeb7f
SHA194b8e118442195d44f5232324039b0c268faf52c
SHA256ff7cfaab16e74aea5cb66866afacc2a73e371cacce14b19f6a6999ddd58d08c4
SHA5129f8bc6a50abd63c67b893145c2e03ceeb7f8d857175f46fe4082f48de6c7034953f77aa31ec29a1bedf7dcd8e48997f18c48fb437be1aea3c9723b0ee29b1d7c
-
Filesize
13KB
MD5c83e5af816f6321f70e008820bc2f727
SHA10aceda4d26480c1c8e617f5ceea6d9ac94bd6fd2
SHA25620617601dc575cd7860ed761da0b5301994c7e042cacc1bc0c6976871e3f1b63
SHA51296c6f785599bef191fbad23f5a8b5958d0cbc346ea91209b1a4fee3d0f29650c1169b941a160b5711abb85a983ff836a24d1751937052cb9294445caa333a05c
-
Filesize
52KB
MD5b11d629bb11214fba0b0f68c140b53ab
SHA166646c135493f0f35bedaa21c30ce58bef7d4af7
SHA256dd272144f78668a91e353bc767f0d6d16433b31f9481be67b4fb71f589b6ecb3
SHA5122930131ef0b46cd3bd5302e20fcb861c348936afc215660005ad3c5b6b4bfe1400614ffbce91297fa5b6fb8b0c3ba0de6013d8f0c01a114b0ba95766a43e698f
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD56ad285c5b2b0fb07192d3b5b3896e47f
SHA1aaaefeeb0c70835ffe1560477d147db91bdc5734
SHA2560768bfcce45b1008eefeed84fd177bd0b027787d6ae8077b7e536fe83194c64e
SHA5128b986b05896ca0cc7b725d930cc5720f98fc3b9c44a17b3fd4b827a6124e8fd8c88cd1b3becb579f1b3eb4b25e9387a6db0a9458a6e681b7685d14a80cbba6b1
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD53f5a19caef92852a07408415e8b029e6
SHA11777a485074b7b004dd80674a045af9ba67854c6
SHA2565736e6fcda7e4784fd13664729d051da4b816a2cbf096d4d80d7ebce00bc0045
SHA512370c22a872c49e232ed19fd6e74d8c6acea1d05ae0a70181c45316062bb19459402563eef7ea0c5330645fef9023d88ea50756175adf8c865f92eb7a8e1fceb6
-
Filesize
5KB
MD50ed5bc16545d23c325d756013579a697
SHA1dcdde3196414a743177131d7d906cb67315d88e7
SHA2563e430584cd9774ea3b21d8e19b485b48212fe356776158dd5f3c5f63a5bde7d3
SHA512c93072d11058fa50e3b09ff4da9f3dbe2637c2b5df05e616bd8ddd04557ea1e8b0db106b1545fad334619118c467776f81cf97ca52d3f2fcbbe007f30032b8af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tq9vu3av.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5470b578013e92b6bd8fd27da35848864
SHA1c452648857d6affaeab6b9c2d35c56e128f4be2c
SHA25695f03e697ebfa045e330fdc75cfe278e3c5b4569a93438e5d0d71cf9c121879d
SHA512e0115faa9c713e861f3ebe9513e5c9f23c8bc2daf680d5c6d2b0a479d0565b4dc21b60b813e310107486085a6ce5a605643f20d28883b9e2d2a86c75a6edb22b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tq9vu3av.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
816KB
MD5268514cf1a58782537ac3651d092f9df
SHA1101110e64b24fd1d4c9a81d5b077be37332f9f6d
SHA25640b5f2486e8a91de7d7a5ea273d24283ee45dcf26cb00ddafff2c2812b449706
SHA5126d7a20cea2cd0361818e0804d05cbfbc461e6cb5885aafceef4c475a092898555b3a73870fea45af6353071b6b943ca884cdb9b92a178a5c0cbef9fb4b9b17a8
-
Filesize
281B
MD5b79b696c92bfe650f95830f2b039dfcf
SHA185fa2ce915ca1d5f612ab6a87cc386cfc75fd9bd
SHA256ab022c78a9566084796ef0b1e04d8048729341660d8feb644d94c37e36b45516
SHA512939eef34029cfdd60c8511a5b2f4d688578d012969f586ba9bbf72e53081795eca02850c9a8718b861829b4f21e678ff7efae55c81daaad6d68c71d9101ea540
-
Filesize
328B
MD57cbe5e1eca4119208496ba24c4056df4
SHA10b8ad2e5a423926968a2025f5defa44c4b5ac876
SHA2567f1f774e00da928d1c9026c114131ffdbe17289c44ecef101cc282ee134db24e
SHA5126fddb38f06be156a0b268add346077056e1c397fe0b45a2e3252d924d8050e78d3665a6ac7082850dda96cf31958661001be35c9703cd136d24c7bb92b0c85fb
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QQ0FXGRWMKQRMRUWYS6S.temp
Filesize19KB
MD56fc6a95cd1504fda4ea39f507d8ee8ba
SHA1fe705c717596cca71066e00fe2aea49a5e8a90b1
SHA256dfc945478b55855c3b5111a63196e2a00322f69135103c29d6b141f15971cd2d
SHA512ecb78ca91690983e6d26ed0adfcfc6adb87bfb5fa961d3e91b986ff8221c6474a886220e749b75b7f514782bce1ec5abb8f899d63a0327b56bfbc875c63e7c0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\AlternateServices.bin
Filesize8KB
MD53396e8dcffbc05beac57ca093dd76713
SHA1d470c361a4d80368154f59e18e361775508ef7f3
SHA256cb5f489cdb9f3c23f7db496224c876c7647bdbfbf43e2f75a1a6a02dd8765f7b
SHA512ba052a9f9140f54b19002540c5aa1b5b070519aaf39a0224d263b251599b101c5079097d41a433a54de9e43b9b885e404468098007d88cec20324a5186b88ea3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\AlternateServices.bin
Filesize12KB
MD58e72ef935d0a7dfee2f149a621903545
SHA1f419be801d5c5d783b3254818c7912900810ecea
SHA2565533f95b52f1319f1f49ab8d3efad72ba8d960e747e8aa86b2198fc4a4926372
SHA512d936323c442578fc4edb3769603759eae298c27ae323f72cc10ef4fe947127791aeb1bcfd897677a8001a15096ee96a94a9b8edf5f7c19781a587998ebe98e8b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5d8296b02096525772abbc615ad106f2b
SHA13765cee5068fd109ab36748513becb5afb08a438
SHA25645a49036c1960b71a2fdce4ac2238b8b40e91acecbfd34a677aa62e813359a0b
SHA512995feec6b75679755cde57e4b66f68cb8be961db7dec1eb3c45b8baf4ccaf17631fa0ca82b13a12e955b63d1e7328a947495277c9e2a769664be59ca2d3b2b9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5b788298eb47c74869d3282f2d5be74d9
SHA10116cc02d2b85555e49489497346ca35b294e0ca
SHA256b8e18e5e72c068d88a362cf438dec61ba13c33fd67a3eb2a70896c093bb37e10
SHA512126d57bb972515a4814ced009651f04af6f4eeeded66d68263f37409043e599e48df67beb7664a1ec893e74e58e8a5027a76b8a5c303b77c4c957a0a01c2b506
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp
Filesize47KB
MD5edda21b088d073677c0f31d4c9f2e498
SHA1217c908b100b530169081daf0236c200069de524
SHA25632f4b155320eb33736fe5e3525dd0a33953b50b260f35d1fa22459a36673d966
SHA51241d0003ffdf815511a029a27dc030fd698253f8b38f585cbe5723cac8d3da868cf92d72884c91300f4df09351cfa3d655fc1071c3c56bba885697502ae55c55d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5c31ecf6ddde78d8222dbc7842cfc72f7
SHA12854d58a3cb3df9fc70b088c94fa7c48d07c1677
SHA25637d911a14c85449d94bf9a7702a6fb1d305a18e8aa59aef789d172fb82dfb070
SHA512d19a689ccd7ab898c54cfb8516b5064a21b28e81c0a6409372dd0974d0bfe786b297af5aaaee1f6ecf29c2f6a33e7bad1797e82c3a34d558f3adbb0ab31c922a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp
Filesize74KB
MD599fdd24424f7c9df5141498c67acc17c
SHA17b34e762fe7c6ee0257579bafb203086778241b6
SHA2562b86218c6a7e7f7c70775fe815f3b31f167f5f6fa6fd272c3f03a0f242307ea5
SHA5129df805db1ed0dacdb3da6b77229e3b0869b10a843a04dc2d27ace2a9f01ef73a8acc59dba00992c980eba7bfab55bb923729e1cc92818ad59ce8ec52fc1d5eac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5c6e2d1a4be54bd9656ca7dc74dbab8c6
SHA1f57d24f690bea8fad715509aab291b8367632f07
SHA2569f37322890cc882382e27df7532a8a27bea6d76f716b06bafc5034eea1634ac0
SHA512c8f372dc174c4a3ae37e15a3c70751a31c4404959cfea8487a1ab9b91716dab814c028570aa09e3b4f1ba2af8f5743d907a51e09f4da93922b30350a686c38a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\pending_pings\383917b9-066d-4f50-98b4-353c769b646c
Filesize659B
MD5951f77a98d2f50523a2e56c052e37575
SHA1037929bd9ba4bef3291b2968e96aeb64bf6db52d
SHA256859679a29383145bd3607db3fe5b8f9fe9569878e6f61e425b5e64bb4d409181
SHA512e4e5f11b26ab90dcc9a5ed23761d7ae3201bb48d961871b352aee311f18339c24bca63b43bc48ea5c393169fa0b3e2f82301f75a1d25ed56514718289c7c732c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\pending_pings\66de34b9-ec5b-4671-835d-2f1db8963b35
Filesize4KB
MD5cb3e09375da5145a0a51974084502677
SHA15dace9595b2525784f60ac6700247efd7271a042
SHA256cf55e49174a246c02f81d1c625a6bb17493831b4a2d3e45ef1c298c80b8cf2a0
SHA5127ae9723ff7431100405c0378fe83175c1d60ab3ea4cff6de3b6281e26977dcbf943b33d0ac5234463d1facb4cf33d611ccc4e3a3381f53d6df14c62003bee684
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\pending_pings\73fba309-16f8-4703-928e-7ffceb306929
Filesize847B
MD5f0ed43d06a52180e3e3fb79fee9af515
SHA19a7c37ec15d962e4d7d07cf8a0a4fc654b602139
SHA256e5f0c51b5c2f8e782f45772d7a322e9115a3c21f2617c68896947ec5182646ee
SHA51237cd05e95bd5b9ad4dce210a4a4c5266f8d1cb34952fb73e4e6698ed95f65686574ade7be3cdb019c49e0563249bc2c753f64675b59157a0f0a89dab5049e282
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\pending_pings\91f79d37-51fd-4a34-b820-a7eeaed939b2
Filesize19KB
MD5f51ca63ee386c88c2428bd614cbbeef1
SHA19fef5f6bd049abe133201fd9ba27ac669dd45028
SHA2564c984b8f7a49a0286d58d7a730295a99410f43ce0caaeef7313449927b4f7084
SHA51221dcada41d30971e175609733343374166a621c0ca93cddd926fc565a6f89159a2a3d9aff7989f6c0f696c0b728dc0c49a6b7e8a71d10769ef33ca8dd8e84c3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\pending_pings\936dbf0b-d695-4e98-be26-e5f7a7213123
Filesize982B
MD5431fe2747f6711ac91a14ca1913eed64
SHA1d97d1d1aa48d6f1085e1a59a9274e56de4cc8ef4
SHA25642c54384dfcedb2f81f2b4d5aa4072fbc321c0d0192d51e8056be22088397d04
SHA512f211d918788b5edeabf5e5077947b66485cf6f8205611beae09b14a4eb56804b0f80989d48321dbfa8a0f1fb35a6cf2517dc75ec496674d0bf31571975950daa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5067c6e813c4a6549e855766e8cedec71
SHA1feb0ddcb61f02e208fb221815809d74632d6d44d
SHA256fd3a3f580e7c3571c1cb636a1d56d03fb2a133b4cd939c862060b76fd0de5d70
SHA51203411c3be90974b9c5a2706263f5eace5a48de462414f527df88d78c231eda246ad0a4831c4da31875476df1290d0cea559346ef8a52e3a28ed299d29fc308bc
-
Filesize
11KB
MD5ea9b7323d2eedbe311e055703a17c6be
SHA1394df051223bef658cff2f228234b09920eb94dc
SHA25666e53d7b0a990de96b9b426723968dac2c7d67cc03da4ee6fc140a767dcd5d93
SHA512e85dca9aba601917ad53b05853137c49f96ee6cd37a1d7bd0c3cf8dcb9e435ddf6b79b9b268cf58e189e81d3940a0e2bf5e0f49388beae3ec4c36bfb29001a42
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5ea2322ff06b7dd7f14552d57239eba75
SHA1d9a6fafae3e734fcd9d66d1687d51cd443ce6b21
SHA25694f3f9affa5b7d292b27a70186cffd1e1b42c648d55c54a3ad3433a3e8b61206
SHA5120cedd5b48109edcaccb94ca1dc928a48725115651829e88332db1b26dc6ef60da4a6474c109ee6fb89e02f4ea2a4348277b9e04fd66a18276238fc2c2a3a0868
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5fbf28fe110d27eb8ae99de652d922f2e
SHA19c40da567fe7d29826112e5ba6fff4a0b73d36af
SHA256c590bb2104fcc297003dfdf0dcf580910d0edfcf12aadfa36ce6afccb5541556
SHA512f4f89aebca6f808e4e7691ef36b6bbd554f20fe9d7427372c9fe262481f66c1b4d7655f81e9e77411b3ad76bf81856dc0a2af20bcea347382bb45f58aafab1d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD567dbf9eb6c29fb998d4182a4432d54d7
SHA1a51202d32af648e0f93be43bf9ce8de906e9cc08
SHA2564d4e6f66e8f4e15ad5e1642d3067d3cbc40146cb2150b3d474c7cf23a80421ae
SHA5125cac4d0ddeaa45a3c59a699e32f91388c0cc47bbda99f4419640dddbbca3a6888814ad0bfff1ab87436ee32b11e29f729f353554d89cb39874b3aca91a68bd2d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5d587d3d8e834a722062dcc47f373b719
SHA173e850af2b1e028652da319e6cea82189ae12b84
SHA25670ba16d692d40bc1097e5030c7583394f48351553de6ee11853f13cc8068c4a6
SHA512d891c487aecdab28f643aedc4da360f87cd972fe76b45d404cce80a43420def314eee55d045e84e963722355a33da8dfcfb3de4c7fc030d1347086a267263987
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD5c6d8780725d8372741121d4b637e4971
SHA1b7c2070699e62fe6d08e4f0fc34344679a91dbce
SHA25660fdb4bfcc77e337e606b0bc5c63a9917b30926b4031eeaf8e8230078287375e
SHA5126d53acdeb6df556f3ff3d6e2a8064f20fdef0da72a4137cf4e3c6e8b11cffb18ee2542274a9e50661df07df03af4f26bbe01b25f43a1c1df9e3a477e385c0993
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4
Filesize9KB
MD589f4e6474ffdc4d9391f551eb2021aee
SHA143e84fb980646f71ad297316c98d2bc056201247
SHA256e8a4bec92302d753766c279a424269c8ad9cb3c4dbf6ddd103dce34d2ff92c12
SHA512ef4300e7211fa3dca3d22fa6a62ee083b595c5aaa32a9f9011aaa516f9ba19d3eb40ef4f0a181081f415a68612618bfbf9ba3c7707458f1897f08217f809d769
-
Filesize
2.4MB
MD57e76f7a5c55a5bc5f5e2d7a9e886782b
SHA1fc500153dba682e53776bef53123086f00c0e041
SHA256abd75572f897cdda88cec22922d15b509ee8c840fa5894b0aecbef6de23908a3
SHA5120318e0040f4dbf954f27fb10a69bce2248e785a31d855615a1eaf303a772ad51d47906a113605d7bfd3c2b2265bf83c61538f78b071f85ee3c4948f5cde3fb24
-
Filesize
94KB
MD56a1549ff24a4926db26e48a2d5ee05ed
SHA1e3a2aaf489df26fa6468ad57a3494b09c9357594
SHA256e6848f4ee31229a2a1f6cf170eefa79d1f6182b00904ec1802ea61a6e9fe323e
SHA512a765f6c7688bb9e48a75bee8edb2d6db7b9330ab9a7d16f01727e8a12d13697b5a38b5d8d736a046a498c858819107605d7c2b3dcec871c07ae79b98b3e6f44e
-
Filesize
60KB
MD5347ac3b6b791054de3e5720a7144a977
SHA1413eba3973a15c1a6429d9f170f3e8287f98c21c
SHA256301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c
SHA5129a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787
-
Filesize
401KB
MD51d724f95c61f1055f0d02c2154bbccd3
SHA179116fe99f2b421c52ef64097f0f39b815b20907
SHA256579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648
SHA512f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113
-
Filesize
401KB
MD5c4f26ed277b51ef45fa180be597d96e8
SHA1e9efc622924fb965d4a14bdb6223834d9a9007e7
SHA25614d82a676b63ab046ae94fa5e41f9f69a65dc7946826cb3d74cea6c030c2f958
SHA512afc2a8466f106e81d423065b07aed2529cbf690ab4c3e019334f1bedfb42dc0e0957be83d860a84b7285bd49285503bfe95a1cf571a678dbc9bdb07789da928e