Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 06:50
Static task
static1
General
-
Target
file.exe
-
Size
3.0MB
-
MD5
e9ad6f2ce6fbb0c701672c884ba36d57
-
SHA1
aa99f81639a5527a815b826b4bca310630da6e50
-
SHA256
1a1d816348d61e30a0ac09f31e641c6c569b36b75eb13beefcdf5ba1f84f2d1f
-
SHA512
21059dea2f666396057a86ab58cac8b0aa04218b84b9860d1082ea8e5fe5387e0acd0cf402d33fe401d6a8c431a2b593d46965609d41f5207d16f920ce966153
-
SSDEEP
49152:PvH00/X3Zzpbf9m4uiKC/8We1lD9gYNvjfTLkPa/0xOp:PMEZzpxm4uiK48Wez1zTCCRp
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://drive-connect.cyou/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 99255f97ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 99255f97ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 99255f97ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 99255f97ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 99255f97ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 99255f97ac.exe -
Stealc family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5fd130191f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4ed99222a7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 99255f97ac.exe -
XMRig Miner payload 10 IoCs
resource yara_rule behavioral1/memory/3680-960-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3680-961-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3680-959-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3680-958-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3680-957-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3680-956-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3680-955-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3680-971-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3680-973-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3680-978-0x0000000140000000-0x0000000140770000-memory.dmp xmrig -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ed99222a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5fd130191f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ed99222a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5fd130191f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99255f97ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99255f97ac.exe -
Executes dropped EXE 27 IoCs
pid Process 2260 skotes.exe 672 dwVrTdy.exe 1436 AzVRM7c.exe 1776 t5abhIx.exe 2268 graph.exe 552 graph.exe 2160 9JTVo50.exe 2088 WkfyDiO.exe 2948 4f15345803.exe 352 5fd130191f.exe 2164 59b0d70023.exe 2704 7z.exe 1660 7z.exe 1172 7z.exe 2460 7z.exe 3000 7z.exe 2640 7z.exe 1476 7z.exe 944 7z.exe 628 in.exe 2908 f99a9aa62b.exe 2944 4ed99222a7.exe 2644 99255f97ac.exe 3124 d295eff927.exe 3792 d295eff927.exe 4004 d1d0270410.exe 916 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 5fd130191f.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 4ed99222a7.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 99255f97ac.exe -
Loads dropped DLL 43 IoCs
pid Process 1968 file.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 672 dwVrTdy.exe 2260 skotes.exe 2260 skotes.exe 2088 WkfyDiO.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2780 cmd.exe 2704 7z.exe 2780 cmd.exe 1660 7z.exe 2780 cmd.exe 1172 7z.exe 2780 cmd.exe 2460 7z.exe 2780 cmd.exe 3000 7z.exe 2780 cmd.exe 2640 7z.exe 2780 cmd.exe 1476 7z.exe 2780 cmd.exe 944 7z.exe 2780 cmd.exe 2780 cmd.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 3124 d295eff927.exe 2260 skotes.exe 2260 skotes.exe 352 5fd130191f.exe 1680 taskeng.exe 1680 taskeng.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 99255f97ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 99255f97ac.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" dwVrTdy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" AzVRM7c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\f99a9aa62b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014689001\\f99a9aa62b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\4ed99222a7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014690001\\4ed99222a7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\99255f97ac.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014691001\\99255f97ac.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 42 raw.githubusercontent.com 43 raw.githubusercontent.com 7 drive.google.com 8 drive.google.com 18 drive.google.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ipinfo.io 32 ipinfo.io 36 ipinfo.io 20 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019512-329.dat autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates processes with tasklist 1 TTPs 31 IoCs
pid Process 1776 tasklist.exe 3688 tasklist.exe 2088 tasklist.exe 3672 tasklist.exe 3960 tasklist.exe 2112 tasklist.exe 2024 tasklist.exe 1972 tasklist.exe 2836 tasklist.exe 2140 tasklist.exe 2352 tasklist.exe 4076 tasklist.exe 2824 tasklist.exe 2096 tasklist.exe 2300 tasklist.exe 2728 tasklist.exe 3276 tasklist.exe 1556 tasklist.exe 772 tasklist.exe 3964 tasklist.exe 3612 tasklist.exe 2408 tasklist.exe 328 tasklist.exe 112 tasklist.exe 2916 tasklist.exe 448 tasklist.exe 2448 tasklist.exe 3860 tasklist.exe 2136 tasklist.exe 2744 tasklist.exe 4008 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1968 file.exe 2260 skotes.exe 352 5fd130191f.exe 2944 4ed99222a7.exe 2644 99255f97ac.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3124 set thread context of 3792 3124 d295eff927.exe 179 PID 916 set thread context of 3680 916 Intel_PTT_EK_Recertification.exe 195 -
resource yara_rule behavioral1/memory/628-315-0x000000013FCC0000-0x0000000140150000-memory.dmp upx behavioral1/memory/628-318-0x000000013FCC0000-0x0000000140150000-memory.dmp upx behavioral1/memory/916-953-0x000000013F8F0000-0x000000013FD80000-memory.dmp upx behavioral1/memory/916-963-0x000000013F8F0000-0x000000013FD80000-memory.dmp upx -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\graph t5abhIx.exe File opened for modification C:\Program Files\Windows Media Player\graph\graph.exe t5abhIx.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f AzVRM7c.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip AzVRM7c.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dwVrTdy.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dwVrTdy.exe File created C:\Program Files\Windows Media Player\graph\graph.exe dwVrTdy.exe File created C:\Program Files\Windows Media Player\graph\graph.exe AzVRM7c.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip AzVRM7c.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f AzVRM7c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f99a9aa62b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99255f97ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d295eff927.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f15345803.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9JTVo50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59b0d70023.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f99a9aa62b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d295eff927.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fd130191f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f99a9aa62b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ed99222a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1d0270410.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1852 powershell.exe 2172 PING.EXE 3768 powershell.exe 3344 PING.EXE -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d1d0270410.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d1d0270410.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Delays execution with timeout.exe 31 IoCs
pid Process 2388 timeout.exe 1236 timeout.exe 1980 timeout.exe 1964 timeout.exe 1084 timeout.exe 3076 timeout.exe 2088 timeout.exe 2244 timeout.exe 3912 timeout.exe 4044 timeout.exe 1660 timeout.exe 3240 timeout.exe 2132 timeout.exe 1504 timeout.exe 1840 timeout.exe 264 timeout.exe 2392 timeout.exe 848 timeout.exe 3700 timeout.exe 3144 timeout.exe 3868 timeout.exe 2536 timeout.exe 2548 timeout.exe 840 timeout.exe 600 timeout.exe 1852 timeout.exe 4000 timeout.exe 3764 timeout.exe 1416 timeout.exe 3708 timeout.exe 3964 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1520 taskkill.exe 2092 taskkill.exe 2872 taskkill.exe 1556 taskkill.exe 2736 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 dwVrTdy.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 dwVrTdy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 d1d0270410.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 d1d0270410.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 d1d0270410.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 d295eff927.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 d295eff927.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2172 PING.EXE 3344 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1472 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 file.exe 2260 skotes.exe 672 dwVrTdy.exe 672 dwVrTdy.exe 672 dwVrTdy.exe 1436 AzVRM7c.exe 1436 AzVRM7c.exe 1436 AzVRM7c.exe 1776 t5abhIx.exe 1776 t5abhIx.exe 1776 t5abhIx.exe 2268 graph.exe 2268 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2088 WkfyDiO.exe 2088 WkfyDiO.exe 2088 WkfyDiO.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe 2268 graph.exe 552 graph.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2088 WkfyDiO.exe Token: SeDebugPrivilege 2824 tasklist.exe Token: SeDebugPrivilege 1556 tasklist.exe Token: SeDebugPrivilege 772 tasklist.exe Token: SeDebugPrivilege 2112 tasklist.exe Token: SeDebugPrivilege 2408 tasklist.exe Token: SeDebugPrivilege 448 tasklist.exe Token: SeDebugPrivilege 2024 tasklist.exe Token: SeDebugPrivilege 2136 tasklist.exe Token: SeDebugPrivilege 1972 tasklist.exe Token: SeDebugPrivilege 1776 tasklist.exe Token: SeDebugPrivilege 2836 tasklist.exe Token: SeDebugPrivilege 2096 tasklist.exe Token: SeDebugPrivilege 2140 tasklist.exe Token: SeRestorePrivilege 2704 7z.exe Token: 35 2704 7z.exe Token: SeSecurityPrivilege 2704 7z.exe Token: SeSecurityPrivilege 2704 7z.exe Token: SeRestorePrivilege 1660 7z.exe Token: 35 1660 7z.exe Token: SeSecurityPrivilege 1660 7z.exe Token: SeSecurityPrivilege 1660 7z.exe Token: SeDebugPrivilege 328 tasklist.exe Token: SeRestorePrivilege 1172 7z.exe Token: 35 1172 7z.exe Token: SeSecurityPrivilege 1172 7z.exe Token: SeSecurityPrivilege 1172 7z.exe Token: SeRestorePrivilege 2460 7z.exe Token: 35 2460 7z.exe Token: SeSecurityPrivilege 2460 7z.exe Token: SeSecurityPrivilege 2460 7z.exe Token: SeRestorePrivilege 3000 7z.exe Token: 35 3000 7z.exe Token: SeSecurityPrivilege 3000 7z.exe Token: SeSecurityPrivilege 3000 7z.exe Token: SeRestorePrivilege 2640 7z.exe Token: 35 2640 7z.exe Token: SeSecurityPrivilege 2640 7z.exe Token: SeSecurityPrivilege 2640 7z.exe Token: SeRestorePrivilege 1476 7z.exe Token: 35 1476 7z.exe Token: SeSecurityPrivilege 1476 7z.exe Token: SeSecurityPrivilege 1476 7z.exe Token: SeRestorePrivilege 944 7z.exe Token: 35 944 7z.exe Token: SeSecurityPrivilege 944 7z.exe Token: SeSecurityPrivilege 944 7z.exe Token: SeDebugPrivilege 1852 powershell.exe Token: SeDebugPrivilege 112 tasklist.exe Token: SeDebugPrivilege 1520 taskkill.exe Token: SeDebugPrivilege 2300 tasklist.exe Token: SeDebugPrivilege 2352 tasklist.exe Token: SeDebugPrivilege 2092 taskkill.exe Token: SeDebugPrivilege 2872 taskkill.exe Token: SeDebugPrivilege 1556 taskkill.exe Token: SeDebugPrivilege 2736 taskkill.exe Token: SeDebugPrivilege 2448 tasklist.exe Token: SeDebugPrivilege 2112 firefox.exe Token: SeDebugPrivilege 2112 firefox.exe Token: SeDebugPrivilege 2744 tasklist.exe Token: SeDebugPrivilege 3672 tasklist.exe Token: SeDebugPrivilege 3860 tasklist.exe Token: SeDebugPrivilege 3964 tasklist.exe Token: SeDebugPrivilege 4008 tasklist.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1968 file.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe 2908 f99a9aa62b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2260 1968 file.exe 30 PID 1968 wrote to memory of 2260 1968 file.exe 30 PID 1968 wrote to memory of 2260 1968 file.exe 30 PID 1968 wrote to memory of 2260 1968 file.exe 30 PID 2260 wrote to memory of 672 2260 skotes.exe 32 PID 2260 wrote to memory of 672 2260 skotes.exe 32 PID 2260 wrote to memory of 672 2260 skotes.exe 32 PID 2260 wrote to memory of 672 2260 skotes.exe 32 PID 2260 wrote to memory of 1436 2260 skotes.exe 34 PID 2260 wrote to memory of 1436 2260 skotes.exe 34 PID 2260 wrote to memory of 1436 2260 skotes.exe 34 PID 2260 wrote to memory of 1436 2260 skotes.exe 34 PID 2260 wrote to memory of 1776 2260 skotes.exe 36 PID 2260 wrote to memory of 1776 2260 skotes.exe 36 PID 2260 wrote to memory of 1776 2260 skotes.exe 36 PID 2260 wrote to memory of 1776 2260 skotes.exe 36 PID 672 wrote to memory of 2268 672 dwVrTdy.exe 37 PID 672 wrote to memory of 2268 672 dwVrTdy.exe 37 PID 672 wrote to memory of 2268 672 dwVrTdy.exe 37 PID 1436 wrote to memory of 552 1436 AzVRM7c.exe 38 PID 1436 wrote to memory of 552 1436 AzVRM7c.exe 38 PID 1436 wrote to memory of 552 1436 AzVRM7c.exe 38 PID 2260 wrote to memory of 2160 2260 skotes.exe 39 PID 2260 wrote to memory of 2160 2260 skotes.exe 39 PID 2260 wrote to memory of 2160 2260 skotes.exe 39 PID 2260 wrote to memory of 2160 2260 skotes.exe 39 PID 2260 wrote to memory of 2088 2260 skotes.exe 40 PID 2260 wrote to memory of 2088 2260 skotes.exe 40 PID 2260 wrote to memory of 2088 2260 skotes.exe 40 PID 2260 wrote to memory of 2088 2260 skotes.exe 40 PID 2088 wrote to memory of 2344 2088 WkfyDiO.exe 41 PID 2088 wrote to memory of 2344 2088 WkfyDiO.exe 41 PID 2088 wrote to memory of 2344 2088 WkfyDiO.exe 41 PID 2344 wrote to memory of 2796 2344 cmd.exe 43 PID 2344 wrote to memory of 2796 2344 cmd.exe 43 PID 2344 wrote to memory of 2796 2344 cmd.exe 43 PID 2344 wrote to memory of 2824 2344 cmd.exe 44 PID 2344 wrote to memory of 2824 2344 cmd.exe 44 PID 2344 wrote to memory of 2824 2344 cmd.exe 44 PID 2344 wrote to memory of 2664 2344 cmd.exe 45 PID 2344 wrote to memory of 2664 2344 cmd.exe 45 PID 2344 wrote to memory of 2664 2344 cmd.exe 45 PID 2344 wrote to memory of 1840 2344 cmd.exe 47 PID 2344 wrote to memory of 1840 2344 cmd.exe 47 PID 2344 wrote to memory of 1840 2344 cmd.exe 47 PID 2344 wrote to memory of 1556 2344 cmd.exe 48 PID 2344 wrote to memory of 1556 2344 cmd.exe 48 PID 2344 wrote to memory of 1556 2344 cmd.exe 48 PID 2344 wrote to memory of 2704 2344 cmd.exe 49 PID 2344 wrote to memory of 2704 2344 cmd.exe 49 PID 2344 wrote to memory of 2704 2344 cmd.exe 49 PID 2344 wrote to memory of 264 2344 cmd.exe 50 PID 2344 wrote to memory of 264 2344 cmd.exe 50 PID 2344 wrote to memory of 264 2344 cmd.exe 50 PID 2344 wrote to memory of 772 2344 cmd.exe 51 PID 2344 wrote to memory of 772 2344 cmd.exe 51 PID 2344 wrote to memory of 772 2344 cmd.exe 51 PID 2344 wrote to memory of 904 2344 cmd.exe 52 PID 2344 wrote to memory of 904 2344 cmd.exe 52 PID 2344 wrote to memory of 904 2344 cmd.exe 52 PID 2344 wrote to memory of 1660 2344 cmd.exe 53 PID 2344 wrote to memory of 1660 2344 cmd.exe 53 PID 2344 wrote to memory of 1660 2344 cmd.exe 53 PID 2344 wrote to memory of 2112 2344 cmd.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1544 attrib.exe 1856 attrib.exe 1908 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe"C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe"C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\1014564001\9JTVo50.exe"C:\Users\Admin\AppData\Local\Temp\1014564001\9JTVo50.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\1014611001\WkfyDiO.exe"C:\Users\Admin\AppData\Local\Temp\1014611001\WkfyDiO.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp19B8.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp19B8.tmp.bat4⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2796
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2664
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:1840
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2704
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:264
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:904
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:1660
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:1148
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:840
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2244
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:2536
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:1084
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:600
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:1564
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:1852
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:1464
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:2392
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2132
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:848
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3056
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:2548
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2036
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:2388
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2564
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:1416
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2384
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:2088
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:328
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:332
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:2244
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:1600
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:1980
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2976
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:1964
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:1188
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:1236
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2116
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:1084
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:1712
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:3240
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3680
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:3708
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3868
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:3912
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3972
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:4000
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:4016
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:4044
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
PID:4076
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:4084
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:2132
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
PID:3612
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3620
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:3700
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
PID:3688
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3684
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:3764
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
PID:2728
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:1652
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:3076
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
PID:3276
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3328
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:3144
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
PID:2916
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3904
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:3868
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
PID:3960
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3912
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:3964
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"5⤵
- Enumerates processes with tasklist
PID:2088
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:1724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014686001\4f15345803.exe"C:\Users\Admin\AppData\Local\Temp\1014686001\4f15345803.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\1014687001\5fd130191f.exe"C:\Users\Admin\AppData\Local\Temp\1014687001\5fd130191f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:352
-
-
C:\Users\Admin\AppData\Local\Temp\1014688001\59b0d70023.exe"C:\Users\Admin\AppData\Local\Temp\1014688001\59b0d70023.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵
- Loads dropped DLL
PID:2780 -
C:\Windows\system32\mode.commode 65,105⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"5⤵
- Views/modifies file attributes
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"5⤵
- Executes dropped EXE
PID:628 -
C:\Windows\system32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:1856
-
-
C:\Windows\system32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:1908
-
-
C:\Windows\system32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE6⤵
- Scheduled Task/Job: Scheduled Task
PID:1472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1852 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2172
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014689001\f99a9aa62b.exe"C:\Users\Admin\AppData\Local\Temp\1014689001\f99a9aa62b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2908 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2944
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2112 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.0.1097249148\2021862513" -parentBuildID 20221007134813 -prefsHandle 1200 -prefMapHandle 1180 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6f0498f-8517-40c1-8742-86c3df747bdb} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 1304 46d2b58 gpu6⤵PID:1276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.1.1666363168\303389109" -parentBuildID 20221007134813 -prefsHandle 1464 -prefMapHandle 1460 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2cedd0db-21c3-4c5d-bafa-b5eee128615f} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 1492 d73358 socket6⤵PID:1544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.2.159480950\834827003" -childID 1 -isForBrowser -prefsHandle 2100 -prefMapHandle 2096 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {924585c8-31e7-4869-a677-2f7c4b72fe2a} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 2112 19ca1a58 tab6⤵PID:2476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.3.294944026\649108995" -childID 2 -isForBrowser -prefsHandle 2912 -prefMapHandle 2908 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {538736d4-c485-4af9-80c8-032d18b3b45d} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 2924 d2e758 tab6⤵PID:2296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.4.648053375\702489153" -childID 3 -isForBrowser -prefsHandle 3684 -prefMapHandle 3660 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd12ccaa-acff-41d2-b83f-e6d75cdc952d} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 3340 1e7a2558 tab6⤵PID:3152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.5.70088557\1147366894" -childID 4 -isForBrowser -prefsHandle 3760 -prefMapHandle 3764 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {57533fe4-3020-4004-a53c-500008625771} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 3752 1ef49858 tab6⤵PID:3160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2112.6.1618959015\575877747" -childID 5 -isForBrowser -prefsHandle 3924 -prefMapHandle 3928 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd486660-3ac3-42a9-aa08-aedfbbdaebca} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" 3912 1ef46e58 tab6⤵PID:3176
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014690001\4ed99222a7.exe"C:\Users\Admin\AppData\Local\Temp\1014690001\4ed99222a7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\1014691001\99255f97ac.exe"C:\Users\Admin\AppData\Local\Temp\1014691001\99255f97ac.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\1014692001\d295eff927.exe"C:\Users\Admin\AppData\Local\Temp\1014692001\d295eff927.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\1014692001\d295eff927.exe"C:\Users\Admin\AppData\Local\Temp\1014692001\d295eff927.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:3792
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014693001\d1d0270410.exe"C:\Users\Admin\AppData\Local\Temp\1014693001\d1d0270410.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
PID:4004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014693001\d1d0270410.exe" & rd /s /q "C:\ProgramData\0R1N7YUAS0ZU" & exit4⤵
- System Location Discovery: System Language Discovery
PID:3904 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1504
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AB324B82-68F7-4E8D-8309-0A1AB23C35E0} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Loads dropped DLL
PID:1680 -
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:916 -
C:\Windows\explorer.exeexplorer.exe3⤵PID:3680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe3⤵
- Drops file in System32 directory
- System Network Configuration Discovery: Internet Connection Discovery
PID:3768 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3344
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Process Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5f89267b24ecf471c16add613cec34473
SHA1c3aad9d69a3848cedb8912e237b06d21e1e9974f
SHA25621f12abb6de14e72d085bc0bd90d630956c399433e85275c4c144cd9818cbf92
SHA512c29176c7e1d58dd4e1deafcbd72956b8c27e923fb79d511ee244c91777d3b3e41d0c3977a8a9fbe094bac371253481dde5b58abf4f2df989f303e5d262e1ce4d
-
Filesize
120KB
MD553e54ac43786c11e0dde9db8f4eb27ab
SHA19c5768d5ee037e90da77f174ef9401970060520e
SHA2562f606d24809902af1bb9cb59c16a2c82960d95bff923ea26f6a42076772f1db8
SHA512cd1f6d5f4d8cd19226151b6674124ab1e10950af5a049e8c082531867d71bfae9d7bc65641171fd55d203e4fba9756c80d11906d85a30b35ee4e8991adb21950
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5b08b3f48ce49fbdf52a9b3251155f967
SHA16e3d5e840ffb4a5b89aba3f4e311d368a8062e61
SHA2564a7630a71d7ae873f5af598afdcde694b1fed764b7ffdb78b90de68bcc8da173
SHA51257eb36cfeca12f6cc4c0bba6ebdf5601909e2686d2f5ebda747792feebb6b4177d2201eef6bcce57231253c42517cf9dd501846f142c2d3a572118f49b35c14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5
Filesize471B
MD5f82d5aca5ed5100b9c82259f5c97bd5f
SHA1c5fe6c4d597a84244e0330d53887d7865bc8d430
SHA2568484447947db2ae840af4235ae99c704d8048091b0a71f098d18d755759d7178
SHA5125a9f1b0cba4a1c6974a1d3929c4cf4d6c2b11041bc61cdeac68f8f5915bc19bf56e589b1a8739c8ff3cd4a6e7912405b35bd7f6dbd5ce66dfd465163d638ef47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660
Filesize472B
MD56e21d4c7d76f1411934abcec47aa4f6f
SHA16b1ca4ee9524085a35c2f4f99d1603b4a31829e9
SHA256a77a50019d85cd5c6ce6592dfa4b8dcc63399f279e15c06288d13e2dde338e13
SHA512ad2bdb52d35f926ae93710e5a3c7775787fb1b2c1a2802f502b70954b1b41c5aafb24ef6d98bebce19bad0fe6a8f29b1f169b55fa49bc5592fa196a42d8c2868
-
Filesize
504B
MD57534282617c6278db5ebc9da5b2c673b
SHA14d804a0a0e7c4f0ab1791e9c68c58833d7fc7811
SHA2562904a768575e22df734148cd01c687a5dd23a6d2b378ad3a972f6e7f38fa77cc
SHA512c45746c38c1e8f0d694a05ef0785070b4f7e3df34a264a3693983d555232bc7b61e78e24187fce8e093448d1724f1226afc3baf262860ad75f076bf57f5929a0
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5257708d812f794393a4e0bba61407e76
SHA1830d3832677c7ad898691539c3a07d061a53431d
SHA256f047bdbf70e30fa241dcaec096ca13a9f5d26ae1056efb992445c63112637f71
SHA51206cb22f32ba134f70c283c087419f3f24ff33702f6cc85c3ed8701135353ae6fdad346a897ff5ee3f76064d0fef4b002a43ae0f4c84d0e25df931e6458666032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD563c8b831b05e8d36d3f49c201899a5ad
SHA1382ae134f2705c3cc8513ddad25a8a71318ffc90
SHA2562f93ca32ce7617e097c71eba50048d4d322be27fc0544a6eb8d0e731cac8d222
SHA512e240d3ccb53badf8e1ac4c819f75f51ce57f0895728004f1ea5a25cc4dbf35d698ea5fbdb82eee06698ba106ba343db1982fd61fd997392ab97920e1d316fb7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5f49d807be5f6e2371f00a1212d49a67f
SHA198e4d5b1a82a5b172b73dcd8a270be384a13b011
SHA25677149d6fbe3457ef63e64f0bfab4ad42b90db3116495b278c5697f1d0b45645c
SHA51264d3c5f9bbe9ab286d841c54d187a3fa7994ecaa5906d0669279e6f9d976315e9f0e3ff30465de84c9d6eaf2c796ba6cba1e6b7c76a4e2016a397e9da196523c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5
Filesize402B
MD5283833e807b75b5d13eaa3205fe43521
SHA18e227b727b83159af0294346837bcb589bd0bc60
SHA2563f37201248b82c5cd1d7fe6cb718e51ac8166c4d57b549078657afac06a69cd3
SHA5124b1ad0b8add13e7233fa8a2b966f4ba8f89770ad5f47f26829f9e61c8a95fd8f93b9d61f0897212da283c34a23f7b392d55bed0e1254e7ea208fb2155cc858cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660
Filesize398B
MD5ea38baa55cfcfa1d8cb766344d211b33
SHA1f28c3de4429397bc36cd2e1c74c73e81aad3bfd0
SHA256c4ac3662bb41f1fc6367235e8d512c863c7671ade2bd68aca566d796f93656c0
SHA512c0380c32c59ad6fb89e8e0b6db6288ff55f7f755d851d4a70faf543d5f91754826eafa26d07843e02628dab81b0264c0b969e0f708473fd63b872546d9dd1072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D73CE810F817D372CC78C5824C36E338
Filesize550B
MD537e748c58b27e99f45af499099d313b1
SHA1fec3419986f727ff158067e1ade8837030d698ca
SHA25652d9acf90925a5c3a113609aeda68d6113ffb8b23cd7c716136fead74e7390bd
SHA512600b8db20149530a004ead2e5b1835bb3eb36c41d6fb0fbfd98771b94536a8bb8f400bc18a3c1a8b923d4c289a1662413e33ddc67ef4b2af10d2a3a296d8125a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55fb5d93dc0de79974068c2d4701296a6
SHA1eeb4db7eac9566f8255fc2258233cd7e257ffc89
SHA256aa299a291b86cf97dcca39e90b982835d0e5e913702f1fd92bbae69aecbd1e22
SHA5123861c7177ec65464de7b946d22562394e9e525202f0313289d9c2ecb9a38ef6e1371d6a4d82cbdce6ebf3e26c029cb54161e1f2568677b876b67305287cc8d92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp
Filesize32KB
MD5e475133809d8a7bf631472fea5a20654
SHA1a2fdda416973a8546333df4a1b353262cb84b311
SHA25699a7280258ffe6fa1fb5445eb4ac99a61dee036c9f17d53c22ae1c15f93a4d78
SHA512a7eae968065058313c52e4f8a0b19ec20856574fb43827730d97082adf7849ddc8009211a3016a71d46bbd7c2fccd4fe26fed5a38e6d09e456feef61f317c67c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
5.6MB
MD5be95bb9b4d8738550ccf07b8f2309c53
SHA1c0028d907c46f474b342e343d79d94e1331ea019
SHA256efd5e8f0852e326a68d4d5cd42d20182ce518fa0b919bb44eeb5450f8830153e
SHA512317eafe32b8046ea3a1193334362f5caed7e18f47e8ed5b85b6de2e0405869e645ea10483017250ec25f63200cef848267340ae2d7133bbf8dffbc5dffbd666f
-
Filesize
1.8MB
MD5602574ce5a6eea6388a2d30a490ddfa9
SHA1efe09508381076205f1b23a03b1baea6d36eaa95
SHA2569edabdb564b79176743506ba6466765f5193ab2ce29f7bcbbb7f1a694ed54768
SHA5122425affe7ddb06e8beaaf9ebd430a6fef7b0789fe8a74251cd689da8f7722189a492b0047278933adbeb8bc8e77aafee8a360a0102f932b8ca9838525222fa00
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
949KB
MD52fc0741f6f4a989e9b55081f90df178a
SHA1f565869e959f86c4b35f1f1e929a26a0428e8e9d
SHA2561f1f5ef3819b45c11862020855fd81065af664fee5fef3ade41e137919b825a6
SHA5126596810859e2448830eb3b12273bbdc54479f529f268f5802e8585f4f7f83b5477839273d71cf6a5a8be48fe70b089613270b69e6cad7bfdc7bb3fee7b1af012
-
Filesize
1.8MB
MD5b14cf4c1b9dea30bba1c414bde4b5d4d
SHA16cff93e02737fc94bcd75e807333eae253ebed87
SHA256851aca60eebf0e1738adc81a52ef213b0aec834c715ad11896a00dd96ea03f3c
SHA512f7cded15c3fcab972906c268a655d9adf33f144e3e50d04ef47c8b5a0f31aa9e48427487c2e02cfc241546bfc0a82e52efbed753b04b44ba333d10a015aa3b50
-
Filesize
2.6MB
MD53c38e31dae752231e4bf19d6e3939817
SHA1b48bba26115f87493f8cb44c1e11e046c97b0390
SHA256146eb1b538a0e5ada3c1f6e23db2e053326279248157dbf99b1900ee7aa38a8a
SHA51216d5d15589e550cacf9f787864512aa29e686f29b788ee8e294b987c58228f4a06a5733f6aa394e385a35fecf1f9affb96628a9a4b3f7c763ba1e8d734bb5854
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.7MB
MD57187cc2643affab4ca29d92251c96dee
SHA1ab0a4de90a14551834e12bb2c8c6b9ee517acaf4
SHA256c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830
SHA51227985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3
-
Filesize
1.7MB
MD5b7d1e04629bec112923446fda5391731
SHA1814055286f963ddaa5bf3019821cb8a565b56cb8
SHA2564da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789
SHA51279fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db
-
Filesize
1.7MB
MD50dc4014facf82aa027904c1be1d403c1
SHA15e6d6c020bfc2e6f24f3d237946b0103fe9b1831
SHA256a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7
SHA512cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028
-
Filesize
3.3MB
MD5cea368fc334a9aec1ecff4b15612e5b0
SHA1493d23f72731bb570d904014ffdacbba2334ce26
SHA25607e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541
SHA512bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748
-
Filesize
3.3MB
MD5045b0a3d5be6f10ddf19ae6d92dfdd70
SHA10387715b6681d7097d372cd0005b664f76c933c7
SHA25694b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d
SHA51258255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
297B
MD5c8dcb510b4c6afd97c7fc09ec63a916d
SHA19573801d6d1bb738782d89f4a33bf00b06c36104
SHA25665d90ff5ee7283aa248a7cae50b7ada7da0060d231648d7f2d9c0122c16873e2
SHA51271d8c965002548dd367062bc5b197b15730fa142b0c339f0470bf3bf5b98579d271fb550fc2bf127ea8a9b97090cbb1ce2a5139f0bc15a232ea792b4867c230e
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD545c6c238097c505c47dd97dd5cf6ce5d
SHA153b40e60aadf1e0f152ea44e7883a004048f77ae
SHA256a3dec2a10c3063368c389bc4eb10f71a6705e69d5a0b37af8f5c607c5877e420
SHA5123efdcd8df111e738add34ea8321bccafd3f4efa160a705bd5379eca5bd86205c7cd4bbb68d860c469d1d6e57ec845db83ffbd6a7799e2f4f36a444e08255f4fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\286da205-7730-4c61-b308-ab310821cbab
Filesize745B
MD5f7d28b41340dc367eeedab0d116cb28b
SHA1847935a3fc286673426473399ef42ed7f5b96fae
SHA2560133e2b71713370e26fcb06c0cc60b672ab80528e6276fb74bcf79e87dbaf235
SHA5120287b61f3ad3ec506633fb687e0fbf0e36441f98dabec41e3f01090cad67baf1b93b26aa29e3f00dec19524cf8e524b95b831fe79bb19719f27492b3958de5f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\4ecd22c3-0b3e-4f3f-b7e3-99cc9fac89ab
Filesize11KB
MD5350895a229c5379e57757ef6f8c88407
SHA14ef4783b4398c0619821d6b8aac25bcbf1f7cda0
SHA256c8fb7b1f8c4a9eb712515fdbdb9180ab5f19cacc14b4dd53aa132f40c07ac843
SHA512c5560ae25d3497677f7b3fec388d62462b2e54c74b00c994c4b9037c899c56ce4c9984bfb5c3f4fdcffdae2f361fbfa140ed7d5ca2f5d12e2e94934eea35d004
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5568910b4e560cbd1a52b8f31edf869bc
SHA14b7c3cb133d04c54c3d2a140c865cc3f371a4afa
SHA256b433cc311cb078ed1b6075fbdf7c57923cbfe817d2ad4517fa421682ea477116
SHA51257140d0148519159e862be90fae8fad5d221a247f435bfe3617c2de94fb46120643279a7d1e616a575e1a9787c1887370da5e5ec104e5a2c47394a50a86e3df5
-
Filesize
7KB
MD52b3b65e5d0d08e8b40328a4fac0cff04
SHA1ea3ae04e2cac0ae36383665ba01a8fde4e1dbf74
SHA2564af3f545e1cf3f1d9825f99723b1f7424b8ecadacf8bde6d4a7b409ab90d6bef
SHA512083b27642de5f0f1d8629cc3b7f9a86444474ce858f62b2c8143ed2c32e00564795a01460f02e820c2fa16fae6aa08913e5df5035324b788c534b2f6467e4e71
-
Filesize
6KB
MD512bb513b7b1318f93d7116fa45c8b374
SHA179c15c930db6b1770632edcf12180dd1a187cc8d
SHA256274eb4099e6f216aa125698cd9519bc0beb2c06fda8139ccca70b9e9464fa83d
SHA51249fa3b4e86a7beae753326931fec1b8e5cdd0d2be853f153d8a6f5d1e33e0f843ae76964d7a2312424e971f03a2a6e33637dc4f8c81351151c4fdf2a59185466
-
Filesize
6KB
MD519050335c5dc7512fdc66dbcf046d879
SHA18415462ef0026e5a2752a3e52d1ab4faadf725aa
SHA2564029b254272b1f7f2b5c6f9c17e7713b4e275cd664fdf277aa20095466c56170
SHA5123393829b4da9f121bbc8ec74c37c33fd0c10313dbd04ca4dd9b86f584e840559cb7a7287bf39e4d1649289e14dd958602afead70b9607b26055f25470492df85
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD58def1599d6965e1e8f02febbc8b8e8f2
SHA12f0577a3bec8797f5bfad4c184535959aa65e974
SHA256a9f2a7bd822c7ec081551f8a3a829e10e38997c34a39c5547ef6b25939519f09
SHA5122d7ec3e3fd4ecd14a449334507a2d5049246b0f42a6527bbcb6bef9ea6b83abcab6dc5fecbd9cc9df01025014de5fd9b396090115926a801c7a60783ac7a445e
-
Filesize
245KB
MD57d254439af7b1caaa765420bea7fbd3f
SHA17bd1d979de4a86cb0d8c2ad9e1945bd351339ad0
SHA256d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394
SHA512c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
3.0MB
MD5e9ad6f2ce6fbb0c701672c884ba36d57
SHA1aa99f81639a5527a815b826b4bca310630da6e50
SHA2561a1d816348d61e30a0ac09f31e641c6c569b36b75eb13beefcdf5ba1f84f2d1f
SHA51221059dea2f666396057a86ab58cac8b0aa04218b84b9860d1082ea8e5fe5387e0acd0cf402d33fe401d6a8c431a2b593d46965609d41f5207d16f920ce966153
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628