Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe
Resource
win10v2004-20241007-en
General
-
Target
fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe
-
Size
1.8MB
-
MD5
bdeb547109fdc5de13e73106d97ad265
-
SHA1
cf1217536d7f7265c4975ebecaccb3d5f9fce81e
-
SHA256
fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933
-
SHA512
a58507ecd90b87acea5080311edee8f73a2d64704ea46857970ec372d66b4169a611320694cacf7fd89a074b4b19283e6f2643730c69a8a8da8d9bcc4d11422f
-
SSDEEP
24576:jFIg76RxPNv2bDHnWXhPy7ydOzB+O+eYQA45gjOceZMG2GiCjgmTqg/xUrR6T8CI:juntaHUha7kcAdDQ0Ob2GZgQqFrRChs
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7849a93269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7849a93269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7849a93269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7849a93269.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 7849a93269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7849a93269.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 10334d5931.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 10334d5931.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b414b1d09.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 00b2558a7d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7849a93269.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 00b2558a7d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 00b2558a7d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7849a93269.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7849a93269.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 10334d5931.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 10334d5931.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b414b1d09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8b414b1d09.exe -
Executes dropped EXE 9 IoCs
pid Process 2904 skotes.exe 524 knotc.exe 1960 knotc.exe 2676 10334d5931.exe 1336 Process not Found 2680 8b414b1d09.exe 2764 00b2558a7d.exe 2140 987d20f406.exe 1580 7849a93269.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 10334d5931.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 8b414b1d09.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 00b2558a7d.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 7849a93269.exe -
Loads dropped DLL 11 IoCs
pid Process 1084 fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe 1084 fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe 2904 skotes.exe 524 knotc.exe 1960 knotc.exe 2904 skotes.exe 1336 Process not Found 2904 skotes.exe 2904 skotes.exe 2904 skotes.exe 2904 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 7849a93269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7849a93269.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\8b414b1d09.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009553001\\8b414b1d09.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\00b2558a7d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009554001\\00b2558a7d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\987d20f406.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009555001\\987d20f406.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\7849a93269.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009556001\\7849a93269.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000195b3-303.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1084 fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe 2904 skotes.exe 2676 10334d5931.exe 2680 8b414b1d09.exe 2764 00b2558a7d.exe 1580 7849a93269.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016d1c-48.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10334d5931.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7849a93269.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 987d20f406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00b2558a7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b414b1d09.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1600 taskkill.exe 2452 taskkill.exe 2080 taskkill.exe 548 taskkill.exe 2720 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 8b414b1d09.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 8b414b1d09.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 skotes.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 skotes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 8b414b1d09.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1084 fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe 2904 skotes.exe 2676 10334d5931.exe 2676 10334d5931.exe 2676 10334d5931.exe 2676 10334d5931.exe 2676 10334d5931.exe 2676 10334d5931.exe 2680 8b414b1d09.exe 2764 00b2558a7d.exe 1580 7849a93269.exe 2140 987d20f406.exe 1580 7849a93269.exe 1580 7849a93269.exe 2140 987d20f406.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1600 taskkill.exe Token: SeDebugPrivilege 2452 taskkill.exe Token: SeDebugPrivilege 2080 taskkill.exe Token: SeDebugPrivilege 548 taskkill.exe Token: SeDebugPrivilege 2720 taskkill.exe Token: SeDebugPrivilege 1580 7849a93269.exe Token: SeDebugPrivilege 832 firefox.exe Token: SeDebugPrivilege 832 firefox.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 1084 fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 832 firefox.exe 832 firefox.exe 832 firefox.exe 832 firefox.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe 832 firefox.exe 832 firefox.exe 832 firefox.exe 2140 987d20f406.exe 2140 987d20f406.exe 2140 987d20f406.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2904 1084 fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe 30 PID 1084 wrote to memory of 2904 1084 fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe 30 PID 1084 wrote to memory of 2904 1084 fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe 30 PID 1084 wrote to memory of 2904 1084 fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe 30 PID 2904 wrote to memory of 524 2904 skotes.exe 32 PID 2904 wrote to memory of 524 2904 skotes.exe 32 PID 2904 wrote to memory of 524 2904 skotes.exe 32 PID 2904 wrote to memory of 524 2904 skotes.exe 32 PID 524 wrote to memory of 1960 524 knotc.exe 33 PID 524 wrote to memory of 1960 524 knotc.exe 33 PID 524 wrote to memory of 1960 524 knotc.exe 33 PID 2904 wrote to memory of 2676 2904 skotes.exe 47 PID 2904 wrote to memory of 2676 2904 skotes.exe 47 PID 2904 wrote to memory of 2676 2904 skotes.exe 47 PID 2904 wrote to memory of 2676 2904 skotes.exe 47 PID 2904 wrote to memory of 2680 2904 skotes.exe 35 PID 2904 wrote to memory of 2680 2904 skotes.exe 35 PID 2904 wrote to memory of 2680 2904 skotes.exe 35 PID 2904 wrote to memory of 2680 2904 skotes.exe 35 PID 2904 wrote to memory of 2764 2904 skotes.exe 36 PID 2904 wrote to memory of 2764 2904 skotes.exe 36 PID 2904 wrote to memory of 2764 2904 skotes.exe 36 PID 2904 wrote to memory of 2764 2904 skotes.exe 36 PID 2904 wrote to memory of 2140 2904 skotes.exe 37 PID 2904 wrote to memory of 2140 2904 skotes.exe 37 PID 2904 wrote to memory of 2140 2904 skotes.exe 37 PID 2904 wrote to memory of 2140 2904 skotes.exe 37 PID 2140 wrote to memory of 1600 2140 987d20f406.exe 38 PID 2140 wrote to memory of 1600 2140 987d20f406.exe 38 PID 2140 wrote to memory of 1600 2140 987d20f406.exe 38 PID 2140 wrote to memory of 1600 2140 987d20f406.exe 38 PID 2904 wrote to memory of 1580 2904 skotes.exe 41 PID 2904 wrote to memory of 1580 2904 skotes.exe 41 PID 2904 wrote to memory of 1580 2904 skotes.exe 41 PID 2904 wrote to memory of 1580 2904 skotes.exe 41 PID 2140 wrote to memory of 2452 2140 987d20f406.exe 42 PID 2140 wrote to memory of 2452 2140 987d20f406.exe 42 PID 2140 wrote to memory of 2452 2140 987d20f406.exe 42 PID 2140 wrote to memory of 2452 2140 987d20f406.exe 42 PID 2140 wrote to memory of 2080 2140 987d20f406.exe 44 PID 2140 wrote to memory of 2080 2140 987d20f406.exe 44 PID 2140 wrote to memory of 2080 2140 987d20f406.exe 44 PID 2140 wrote to memory of 2080 2140 987d20f406.exe 44 PID 2140 wrote to memory of 548 2140 987d20f406.exe 46 PID 2140 wrote to memory of 548 2140 987d20f406.exe 46 PID 2140 wrote to memory of 548 2140 987d20f406.exe 46 PID 2140 wrote to memory of 548 2140 987d20f406.exe 46 PID 2140 wrote to memory of 2720 2140 987d20f406.exe 48 PID 2140 wrote to memory of 2720 2140 987d20f406.exe 48 PID 2140 wrote to memory of 2720 2140 987d20f406.exe 48 PID 2140 wrote to memory of 2720 2140 987d20f406.exe 48 PID 2140 wrote to memory of 2388 2140 987d20f406.exe 50 PID 2140 wrote to memory of 2388 2140 987d20f406.exe 50 PID 2140 wrote to memory of 2388 2140 987d20f406.exe 50 PID 2140 wrote to memory of 2388 2140 987d20f406.exe 50 PID 2388 wrote to memory of 832 2388 firefox.exe 51 PID 2388 wrote to memory of 832 2388 firefox.exe 51 PID 2388 wrote to memory of 832 2388 firefox.exe 51 PID 2388 wrote to memory of 832 2388 firefox.exe 51 PID 2388 wrote to memory of 832 2388 firefox.exe 51 PID 2388 wrote to memory of 832 2388 firefox.exe 51 PID 2388 wrote to memory of 832 2388 firefox.exe 51 PID 2388 wrote to memory of 832 2388 firefox.exe 51 PID 2388 wrote to memory of 832 2388 firefox.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe"C:\Users\Admin\AppData\Local\Temp\fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe"C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe"C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009552001\10334d5931.exe"C:\Users\Admin\AppData\Local\Temp\1009552001\10334d5931.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\1009553001\8b414b1d09.exe"C:\Users\Admin\AppData\Local\Temp\1009553001\8b414b1d09.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\1009554001\00b2558a7d.exe"C:\Users\Admin\AppData\Local\Temp\1009554001\00b2558a7d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\1009555001\987d20f406.exe"C:\Users\Admin\AppData\Local\Temp\1009555001\987d20f406.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:832 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="832.0.1859905923\1873775769" -parentBuildID 20221007134813 -prefsHandle 1284 -prefMapHandle 1276 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ad57a287-f69a-4ebb-a391-0cf9cd0712ea} 832 "\\.\pipe\gecko-crash-server-pipe.832" 1384 44bb358 gpu6⤵PID:2968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="832.1.1458078275\356399434" -parentBuildID 20221007134813 -prefsHandle 1536 -prefMapHandle 1532 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aaf0c0cb-50ed-47a4-b302-3a5f630f1136} 832 "\\.\pipe\gecko-crash-server-pipe.832" 1564 d74858 socket6⤵PID:616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="832.2.1504431616\454046042" -childID 1 -isForBrowser -prefsHandle 2144 -prefMapHandle 2140 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58eea03c-414d-498e-b8e4-a341c1ce940d} 832 "\\.\pipe\gecko-crash-server-pipe.832" 2156 19e6c458 tab6⤵PID:2320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="832.3.1846318817\2093659987" -childID 2 -isForBrowser -prefsHandle 2728 -prefMapHandle 2724 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {64d3026b-9da3-4186-ab05-9bfd6098711d} 832 "\\.\pipe\gecko-crash-server-pipe.832" 2740 d64b58 tab6⤵PID:1724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="832.4.1834711625\2092218076" -childID 3 -isForBrowser -prefsHandle 3804 -prefMapHandle 3240 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {abd9dc11-0e4e-4fda-9656-1987f5ed84b5} 832 "\\.\pipe\gecko-crash-server-pipe.832" 3852 20b46458 tab6⤵PID:1800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="832.5.1918837572\1868416830" -childID 4 -isForBrowser -prefsHandle 3972 -prefMapHandle 3976 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1111666-2dc5-4fdd-bd10-100bfcf3b7df} 832 "\\.\pipe\gecko-crash-server-pipe.832" 3956 20b45558 tab6⤵PID:2336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="832.6.579307287\762418188" -childID 5 -isForBrowser -prefsHandle 4140 -prefMapHandle 4144 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79a2355e-df2c-4a08-9b1c-71f7538ff17a} 832 "\\.\pipe\gecko-crash-server-pipe.832" 4128 20b46d58 tab6⤵PID:524
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009556001\7849a93269.exe"C:\Users\Admin\AppData\Local\Temp\1009556001\7849a93269.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "314078056-1902883095-9868710571743668297-2042393015-808862462-11303642191621347107"1⤵PID:2676
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58019f8801068fed0ac50bde14a64a5
SHA129755cd20b7612618ccb729086aab9d22d93307a
SHA256ce065141f3c2c0a4405ccd84c34f49a3d198c326c4f9b6768ef9c45fa6626476
SHA512fa9362c9bb6d3ad682f329a841580d3533c3aaad8b1648739088b957549c8109c9ffa927cc8a41f91abf26d8b20ba942950fda1dff97343f28705830f1b82c8d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
22.3MB
MD5719dcf184f232c140a40a69f05ae2ae7
SHA1ac1e40daf79114c78ca756f2cfe5619cd2804cc2
SHA2565b5856719e14b1dcf6297e51e69b147263a72203e2f7bc5d938ae41f01312270
SHA51236ec8a14ee9f579f221662f29f08882f6f9dc59637100a99bc782cddbdf3aa1c27925ca5ff94e7b3e52e092a789104713e781226050466841d01cc04960bf2a5
-
Filesize
4.3MB
MD50473a8e8e6d92ece5fe21d23552391d2
SHA15f8b811f0df1a5c7c5de0d7d20965809b120e034
SHA25642c6787fac49fff1f3b622983357d0346048598dd8c7f790fcabd5ed5503a127
SHA5127672688ee9e1c7a204b03d611c110c2930b7a46559111379b34d5abac2d0ce6b38dcc52060fc855e6620cc5fff54ae5783358b0b7d2df24d4e5439427efaa0b7
-
Filesize
1.8MB
MD5762bd927c2a8b71b5192c761c3b2338a
SHA11fd9c4ae497fefcbf48ac2031af053d55c54ac55
SHA256e27cb979a02c937d47419918258061a4b8ef4648e52ec2dcd7efee275040af3f
SHA512737a46803a8238fd30360de7e57f9bfe3674825d7cfc2c8b38950aabc940ef1098b7f824220e3d5a32449001c9dec2a4a4373fe57817447699aa00f0ef366d3b
-
Filesize
1.8MB
MD5e9e8cfd42836e3bd72398502cfdbd5fe
SHA12c158c5adfa6aff3acc5589be5bdeb5b89939b5c
SHA256249aa9cd11e7b0e010221a93398a24e40d77c52ed3a1fe14dd8aa2e3cf827276
SHA5126b6dfb9f5b5bcd9b36bc3f346911853c0fb9ef97efd5ad349e1f7685065c9e5342a7a50f08fa3a73d0f7e72ef8580e27a069d701c7ad0911fd04e51d28e216de
-
Filesize
900KB
MD5acdda6bed858e47c7154c1bf9440f92b
SHA1a043e28b26ef1446470e331abcf4917601c20348
SHA256f8b791be04ffc8d7b3ed60c9283bb7ac1afc1f1fc53ec30530cd779711201e23
SHA51246c8adf0434f049dc3d4efb51dc00081dc38650f9bc2526c8916aca7be979478036b739fd60380e2c312e4116418fd58f059dd1d052851a0952dfdc512874a4d
-
Filesize
2.6MB
MD5e61785a3a3d383435c9e19bf3b694811
SHA188d531034fcb42649a2e28be1e391450f090dbfc
SHA25629d54aefca55bfbdf08555b15e4361226b87e81dee3ee26b965e263bc8ddb48e
SHA512fc1bf899d3d4f079f45da99383d7175dfbbcbe5a3da21c504d80199420a9f2c2aea644188fbddfb148f5b78dcbb3d06878ca7bb0d4657ac1e8e88d91f83cdd6e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5a753086ef24fe2a2a097587a229caf46
SHA1bd80ff1263006d518d7c6032b67fbb68824862fa
SHA25625115c47b05832cecddd456f61df7772deb49b2adf06f82ea2b0ea1269dcec67
SHA5123cd1e048059a304368ffec7db4ff2324d73790261479b18885c35b50c2663e1178918e411b57bf398ec6d6137a53892e3c7b8ff4cda42bb362cf19069eaa7294
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\2c2268fa-a40c-4625-b093-41a9a7ef7341
Filesize745B
MD5b04e5f86b40446cc09ff033f164d4041
SHA1fa9872af5ad548c75110eb957c9f9445d369170b
SHA2569ce87030aa4f91a32c322bde9659db3cb6bbea5b277896a2b7ad58e66659f762
SHA51236357ad11cd60ecec3354b74c91f0d286e29426fd52c0b4df8ce3acb29661e1c2cb3d397cd8de1062e0f18be0c6bb916c07b8311296a32cfa4f9b9b8fec86954
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\df46b296-db8d-42b6-812c-7af3660b1770
Filesize11KB
MD5289b01b324433b9032b9d7cd90c56eef
SHA103e43d637b1ba1ae07380e4caafe93f388d45155
SHA25635acaba5cf138af8e1eec396876c8ffa0b55e7a3aa4ddaf4aa4b09750790b473
SHA512d6e3fc11de2f07a2dc7b090f2fa049bddbef9b7dd83537d58f9b15c95a98bbcc13f136ad58a1104e9793c967824e7021d22cd3bddacbdc67c8db16d77be5ca5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD585eee8981c5208899ec67c23907f1b49
SHA1491b99c99bf7ae6c9460077c9bb912103afaeac2
SHA25617f435f0db1d34abf2001d18ccc79d063f6d79a259015c8b2867aa4272d6934e
SHA5121f15fab1ec3f904d8df94946184a96be597f372106fc78fc74dd39ae45f522b5d110349dcac895d11ecbf75325418946f0a10bc7d4df681e76129ee795acca75
-
Filesize
7KB
MD5d54d405ae64d217c9d307a1643b84b91
SHA1847cf3aebe2dc7bb09b8e4bf06cdfde480e9ffc9
SHA256fc5e3ae97f2b16cdac8fd02c9fc852c06a2e625abeb2496e5066b17500f098df
SHA5124c7a04c2fe77df2a94442a8b44a27089b04e6c9958c7030d8a7a6adb08eab25028ece0a22d80e1aed07eebcac0ce0a3ca589c2b37e30c5e7347ef40252f97fbb
-
Filesize
7KB
MD5ef79e8c556dc82fbd9416cc69fb46af6
SHA11da7a7bec770219aa0f4b0b7e2e8834423fa0e47
SHA2563879750288df54084debb0bba958eb4acf215dd5472450a5505811a960980536
SHA5124b46277145481074f68c66d8b2d8d2f4edbe1513a8c3f1447bad3d009ed72f352cb92361ffc5f6ccc6bf5d869eebeac5b6b1ea59992838b433c01f7c679393d4
-
Filesize
6KB
MD547945cabc8201c0a88ce60d6ce28bdc8
SHA149ff2fed5400873a47f2f346afaa884e5d2b634d
SHA256d9166b7b09a700e0dd92015c16cb75d0790efc272bb2b90da3d3f0932ddbf6d8
SHA512b7c935a628f99eea058284b60e67b80e309f2efb4f770b16f46b900128382f1b48e55a0e031c8dd9c07f71d4549d467f25ff79e4e68387a7d98ba2432d1dafe2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD58fea42db5dbd789b545e17f7e8f84e0e
SHA1797d3e9cbc5344a18d22b885c096610cf3303c3e
SHA256a87a31707a544c8285f423e7e3bdb6ab1630f1409321e6eb6b0d45e4b3dec722
SHA512c39b92e0dbfadef1544464c9c669b5e49ec717ad1b14c731e199c02632aefbfd88212f63c249b3dcda227766285c10eb141fab093c52f1a7b90f234e4aacb250
-
Filesize
1.8MB
MD5bdeb547109fdc5de13e73106d97ad265
SHA1cf1217536d7f7265c4975ebecaccb3d5f9fce81e
SHA256fb07b300dd03a42df14b8a0b30a9b2b789b1933838c297bdc5e17571ebf6f933
SHA512a58507ecd90b87acea5080311edee8f73a2d64704ea46857970ec372d66b4169a611320694cacf7fd89a074b4b19283e6f2643730c69a8a8da8d9bcc4d11422f