Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe
Resource
win7-20240903-en
General
-
Target
26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe
-
Size
1.8MB
-
MD5
ab6fe5323b404459fae6dce3b9c8a505
-
SHA1
64e54cf1d9546097a250fb30a47ed25db39332db
-
SHA256
26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e
-
SHA512
77e5dde6b3b782ad2cfa4deea115c9eac78cd84c3e8844b6daa8281da85c446aaf9f6268734ef11fa4445bcd787aeadb3cc0380ce8a44ea024b9021c45b3d020
-
SSDEEP
49152:n22YHEgV2KNZ+S4d0eVY8pOxJUiCaxoGYCmitcTKkC/:ikgV2a+dm6OxJUiCDLCmyus
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
gcleaner
92.63.197.221
45.91.200.135
Extracted
cryptbot
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://dare-curbys.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
https://zinc-sneark.biz/api
https://dwell-exclaim.biz/api
https://formy-spill.biz/api
https://covery-mover.biz/api
https://print-vexer.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9937eb4bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9937eb4bcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 9937eb4bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9937eb4bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9937eb4bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9937eb4bcc.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 5d97d3f894.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4e4f02fe4a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d97d3f894.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rhnew.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e32a7e0238.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 120b72216e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9937eb4bcc.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9937eb4bcc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d97d3f894.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4e4f02fe4a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e32a7e0238.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9937eb4bcc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d97d3f894.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4e4f02fe4a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e32a7e0238.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 120b72216e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 120b72216e.exe -
Executes dropped EXE 11 IoCs
pid Process 1836 skotes.exe 1100 i1A5m12.exe 2428 i1A5m12.tmp 1140 rafencoder.exe 1240 4e4f02fe4a.exe 2940 5d97d3f894.exe 1820 rhnew.exe 2380 e32a7e0238.exe 1948 120b72216e.exe 1376 3ad3233212.exe 2024 9937eb4bcc.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 4e4f02fe4a.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 5d97d3f894.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine rhnew.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine e32a7e0238.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 120b72216e.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 9937eb4bcc.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine skotes.exe -
Loads dropped DLL 18 IoCs
pid Process 2388 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe 2388 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe 1836 skotes.exe 1100 i1A5m12.exe 2428 i1A5m12.tmp 2428 i1A5m12.tmp 2428 i1A5m12.tmp 2428 i1A5m12.tmp 1140 rafencoder.exe 1836 skotes.exe 1836 skotes.exe 1836 skotes.exe 1836 skotes.exe 1836 skotes.exe 1836 skotes.exe 1836 skotes.exe 1836 skotes.exe 1836 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 9937eb4bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9937eb4bcc.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\3ad3233212.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012394001\\3ad3233212.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\9937eb4bcc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012395001\\9937eb4bcc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\e32a7e0238.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012392001\\e32a7e0238.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\120b72216e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012393001\\120b72216e.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019d20-210.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2388 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe 1836 skotes.exe 1240 4e4f02fe4a.exe 2940 5d97d3f894.exe 1820 rhnew.exe 2380 e32a7e0238.exe 1948 120b72216e.exe 2024 9937eb4bcc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i1A5m12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e4f02fe4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d97d3f894.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i1A5m12.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rafencoder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e32a7e0238.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 120b72216e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 3ad3233212.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 3ad3233212.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9937eb4bcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ad3233212.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2180 taskkill.exe 2540 taskkill.exe 2108 taskkill.exe 2976 taskkill.exe 1536 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 rhnew.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 rhnew.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 rhnew.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 e32a7e0238.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 e32a7e0238.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2388 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe 1836 skotes.exe 2428 i1A5m12.tmp 2428 i1A5m12.tmp 1240 4e4f02fe4a.exe 2940 5d97d3f894.exe 2940 5d97d3f894.exe 2940 5d97d3f894.exe 2940 5d97d3f894.exe 2940 5d97d3f894.exe 2940 5d97d3f894.exe 1820 rhnew.exe 2380 e32a7e0238.exe 1948 120b72216e.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 2024 9937eb4bcc.exe 2024 9937eb4bcc.exe 2024 9937eb4bcc.exe 2024 9937eb4bcc.exe 2024 9937eb4bcc.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2180 taskkill.exe Token: SeDebugPrivilege 2540 taskkill.exe Token: SeDebugPrivilege 2108 taskkill.exe Token: SeDebugPrivilege 2976 taskkill.exe Token: SeDebugPrivilege 1536 taskkill.exe Token: SeDebugPrivilege 1748 firefox.exe Token: SeDebugPrivilege 1748 firefox.exe Token: SeDebugPrivilege 2024 9937eb4bcc.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 2388 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe 2428 i1A5m12.tmp 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1748 firefox.exe 1748 firefox.exe 1748 firefox.exe 1748 firefox.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1748 firefox.exe 1748 firefox.exe 1748 firefox.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe 1376 3ad3233212.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1836 2388 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe 30 PID 2388 wrote to memory of 1836 2388 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe 30 PID 2388 wrote to memory of 1836 2388 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe 30 PID 2388 wrote to memory of 1836 2388 26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe 30 PID 1836 wrote to memory of 1100 1836 skotes.exe 33 PID 1836 wrote to memory of 1100 1836 skotes.exe 33 PID 1836 wrote to memory of 1100 1836 skotes.exe 33 PID 1836 wrote to memory of 1100 1836 skotes.exe 33 PID 1836 wrote to memory of 1100 1836 skotes.exe 33 PID 1836 wrote to memory of 1100 1836 skotes.exe 33 PID 1836 wrote to memory of 1100 1836 skotes.exe 33 PID 1100 wrote to memory of 2428 1100 i1A5m12.exe 34 PID 1100 wrote to memory of 2428 1100 i1A5m12.exe 34 PID 1100 wrote to memory of 2428 1100 i1A5m12.exe 34 PID 1100 wrote to memory of 2428 1100 i1A5m12.exe 34 PID 1100 wrote to memory of 2428 1100 i1A5m12.exe 34 PID 1100 wrote to memory of 2428 1100 i1A5m12.exe 34 PID 1100 wrote to memory of 2428 1100 i1A5m12.exe 34 PID 2428 wrote to memory of 1680 2428 i1A5m12.tmp 35 PID 2428 wrote to memory of 1680 2428 i1A5m12.tmp 35 PID 2428 wrote to memory of 1680 2428 i1A5m12.tmp 35 PID 2428 wrote to memory of 1680 2428 i1A5m12.tmp 35 PID 2428 wrote to memory of 1140 2428 i1A5m12.tmp 37 PID 2428 wrote to memory of 1140 2428 i1A5m12.tmp 37 PID 2428 wrote to memory of 1140 2428 i1A5m12.tmp 37 PID 2428 wrote to memory of 1140 2428 i1A5m12.tmp 37 PID 1680 wrote to memory of 896 1680 net.exe 38 PID 1680 wrote to memory of 896 1680 net.exe 38 PID 1680 wrote to memory of 896 1680 net.exe 38 PID 1680 wrote to memory of 896 1680 net.exe 38 PID 1836 wrote to memory of 1240 1836 skotes.exe 39 PID 1836 wrote to memory of 1240 1836 skotes.exe 39 PID 1836 wrote to memory of 1240 1836 skotes.exe 39 PID 1836 wrote to memory of 1240 1836 skotes.exe 39 PID 1836 wrote to memory of 2940 1836 skotes.exe 40 PID 1836 wrote to memory of 2940 1836 skotes.exe 40 PID 1836 wrote to memory of 2940 1836 skotes.exe 40 PID 1836 wrote to memory of 2940 1836 skotes.exe 40 PID 1836 wrote to memory of 1820 1836 skotes.exe 42 PID 1836 wrote to memory of 1820 1836 skotes.exe 42 PID 1836 wrote to memory of 1820 1836 skotes.exe 42 PID 1836 wrote to memory of 1820 1836 skotes.exe 42 PID 1836 wrote to memory of 2380 1836 skotes.exe 43 PID 1836 wrote to memory of 2380 1836 skotes.exe 43 PID 1836 wrote to memory of 2380 1836 skotes.exe 43 PID 1836 wrote to memory of 2380 1836 skotes.exe 43 PID 1836 wrote to memory of 1948 1836 skotes.exe 44 PID 1836 wrote to memory of 1948 1836 skotes.exe 44 PID 1836 wrote to memory of 1948 1836 skotes.exe 44 PID 1836 wrote to memory of 1948 1836 skotes.exe 44 PID 1836 wrote to memory of 1376 1836 skotes.exe 45 PID 1836 wrote to memory of 1376 1836 skotes.exe 45 PID 1836 wrote to memory of 1376 1836 skotes.exe 45 PID 1836 wrote to memory of 1376 1836 skotes.exe 45 PID 1376 wrote to memory of 2180 1376 3ad3233212.exe 46 PID 1376 wrote to memory of 2180 1376 3ad3233212.exe 46 PID 1376 wrote to memory of 2180 1376 3ad3233212.exe 46 PID 1376 wrote to memory of 2180 1376 3ad3233212.exe 46 PID 1376 wrote to memory of 2540 1376 3ad3233212.exe 49 PID 1376 wrote to memory of 2540 1376 3ad3233212.exe 49 PID 1376 wrote to memory of 2540 1376 3ad3233212.exe 49 PID 1376 wrote to memory of 2540 1376 3ad3233212.exe 49 PID 1376 wrote to memory of 2108 1376 3ad3233212.exe 51 PID 1376 wrote to memory of 2108 1376 3ad3233212.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe"C:\Users\Admin\AppData\Local\Temp\26f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\is-798A2.tmp\i1A5m12.tmp"C:\Users\Admin\AppData\Local\Temp\is-798A2.tmp\i1A5m12.tmp" /SL5="$801B0,3291517,54272,C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause raf_encoder_12525⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause raf_encoder_12526⤵
- System Location Discovery: System Language Discovery
PID:896
-
-
-
C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe"C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe" -i5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012389001\4e4f02fe4a.exe"C:\Users\Admin\AppData\Local\Temp\1012389001\4e4f02fe4a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\1012390001\5d97d3f894.exe"C:\Users\Admin\AppData\Local\Temp\1012390001\5d97d3f894.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\1012391001\rhnew.exe"C:\Users\Admin\AppData\Local\Temp\1012391001\rhnew.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\1012392001\e32a7e0238.exe"C:\Users\Admin\AppData\Local\Temp\1012392001\e32a7e0238.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\1012393001\120b72216e.exe"C:\Users\Admin\AppData\Local\Temp\1012393001\120b72216e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\1012394001\3ad3233212.exe"C:\Users\Admin\AppData\Local\Temp\1012394001\3ad3233212.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2564
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1748 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1748.0.827666947\53867841" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cad85ab-12fd-4365-bc96-b9a936acd9db} 1748 "\\.\pipe\gecko-crash-server-pipe.1748" 1280 11fd6a58 gpu6⤵PID:1708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1748.1.1045470954\2084544752" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {47a49b2a-8611-4741-8b43-443b6f2eb828} 1748 "\\.\pipe\gecko-crash-server-pipe.1748" 1496 d73f58 socket6⤵PID:620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1748.2.1015162359\733818038" -childID 1 -isForBrowser -prefsHandle 2088 -prefMapHandle 2084 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0202f5ac-18b6-42e1-9c7c-e2de6905f963} 1748 "\\.\pipe\gecko-crash-server-pipe.1748" 2100 11f59a58 tab6⤵PID:1612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1748.3.1404046142\1357537124" -childID 2 -isForBrowser -prefsHandle 2916 -prefMapHandle 2912 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e999f56-4b96-41bc-b355-8cb33d48bff0} 1748 "\\.\pipe\gecko-crash-server-pipe.1748" 2928 d63f58 tab6⤵PID:1028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1748.4.1110477488\1036624230" -childID 3 -isForBrowser -prefsHandle 3772 -prefMapHandle 3624 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3db7238-a968-4c69-add4-59d9c6957424} 1748 "\\.\pipe\gecko-crash-server-pipe.1748" 3784 1f304d58 tab6⤵PID:3524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1748.5.171469478\1736902993" -childID 4 -isForBrowser -prefsHandle 3952 -prefMapHandle 3956 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a57dc01e-ed1c-48dd-9436-2517b06bfc2b} 1748 "\\.\pipe\gecko-crash-server-pipe.1748" 3940 1dcdd458 tab6⤵PID:3560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1748.6.104450887\226379941" -childID 5 -isForBrowser -prefsHandle 4136 -prefMapHandle 4140 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b00095b-98ed-4bf3-840d-5a836b452166} 1748 "\\.\pipe\gecko-crash-server-pipe.1748" 4124 1dcdf558 tab6⤵PID:3584
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012395001\9937eb4bcc.exe"C:\Users\Admin\AppData\Local\Temp\1012395001\9937eb4bcc.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD53ecec3ffa3461350e02dffbba511dda2
SHA13c63eef03cfe3e58979b087009c5750aca72233d
SHA256b24425f49ba894928ff5e7103c6e8a0b6a959c42f8a3a64c1916fb1cf428eabb
SHA51274f376ee4779653f2dfce5abca5de58df305645b472216e7fdb42a8bddcddbb15383c84e20e9736978b98a86854f63159e6a6c8176728a1cbe070d8bf49f24f7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.8MB
MD5b466bf1dc60388a22cb73be01ca6bf57
SHA121eb9665e42d6c4a8d9e764627049b2a6e3a69a4
SHA256e5f0f0c3383080fc2702779e3040c490ab022af69a4bc8c61bf9b1f6514ae7ad
SHA5126cb51dae17b3bcef6254ecf6538ecc49cdd53c40c979fd743f49987b28d05c033781b1047dbf25b203b02bf70ce4205dcc1cc5bbea46119cb0e2cd0ce140cbe2
-
Filesize
3.4MB
MD53a16d0e4e4522073da3c8a5a9f9e790b
SHA17a42a21a348d2e49c67b426d333a5c354ed2c83e
SHA256ccc4dd64df98c26da462a17a8df9f927d02e202d88ada8cfba92b7bbeb954c3e
SHA5121213c3e077b660afa65133f0b5943bd866f02d736284791dc99ae4d30c6ed7705eb55999cb4a3be1cc0a394111904154bc72a2d0f1fdc453893ecf9a4a25b99a
-
Filesize
1.9MB
MD56d00ea43be88c32392e2a3b543d0a1f4
SHA11dfb0cb50425d6bf72467ae0894d614f26f0b987
SHA256747ebc458a95ab80f371b899d4b6e54eaefba46bf5343ae39eeeafba61ba8365
SHA512f111a1b9812891d9ddda571e798545743ff9628bcf2c258a9fcb34a89b3d5286a2882d9d635c16062d974aac4d11904ac95fcbb45ecce38aa0e314cba7e7bbbf
-
Filesize
4.3MB
MD572950603b12d5d99f2ebcedeb3aed5d6
SHA13587c298d27279b481f9efa0c02be575b6a06599
SHA25676d86e157a4fa1f1b3abf649b931cdc91af733e2b50a863cc9a1dcbb131148b4
SHA5121fbcb1f8793eab0107924f6ec8789eb1752fd39eb4683193b6962803911abbb7ff1d05a362dec349c768e656f7f84144150b06a35e13f74d60afe422cbb407c8
-
Filesize
1.8MB
MD5f7286fef9317fe91e24cda721ec0be81
SHA10e0197c0f87200f7c1ebb4bba314f7bb875a638c
SHA2564dcf1cc20990dace1f3e7c5a4b94ea7b823f90eb6de639b2b1b6494838f1cc62
SHA512314b3f5cf1a0c15db568d33647b97887b37e987ba253ee9f5ded045446328307ebd04acd832fbdf66ad29be9510bd0c378e2fcb889509dca84df9b9106602c6e
-
Filesize
1.8MB
MD5bd36d7562c72f2300c5a8aff4981792d
SHA18b3f7f55e5e1ba3ac2f11eba0c83b98f444c590d
SHA256faa15db856629abcc10aaeec6b8300986940689ad8a3184c53af40390329a4be
SHA51216c2f2ac5c41ede21027fa3a16f2cbc6d8f4fa792dbd0b7d59e4d493627d9efc35772ad78f886596687009368172dc7bf788dc634923523a52c11755982f08a9
-
Filesize
5.0MB
MD550405b0e3ccc1050cc2345e296371015
SHA17c24f14abd9cee3488751c91c36f3c28a285ff1a
SHA256f3e10ae537649e472f1a1c4aa2be9cdb9126922b95d8895031ddc5178fe36ac2
SHA5125fd09777f9be4b383f828712e3a39e22a740178cad803d7ce141f079078f665d507727caeeb0e8c7e950313e07ff353c64fc73e6f7d223a02e4e28d98334e256
-
Filesize
946KB
MD54d787542ab2f62216d13e350b8495515
SHA1ab9bdbfb5bc1ad81b46a39eb622ff26b516880ed
SHA25650e4e641608257d89ffbdd83788443fd0a5afd04d3c682049092420e32fcb963
SHA5121ceff72feb4dea1d6b2ca5c0f15ed28494ed7ce50b2653f78ed272c053fe87277024d520c304b4eb00045b324cd366664628d3b20d803a9229e4b52c60c085b7
-
Filesize
2.6MB
MD5d97510e06a48bc3159baac94a6299b0f
SHA1643b173325ed519327d3892603641d367c4783a5
SHA2567db04bed60b5c7b3812a1ea9974e4a1ee74cde8c30ac08b8ba591b58f078a1ab
SHA512875987892ac4efa57f92a20b7ce1289295560161fe766dfceb85890e05b520f972ab95fde5178df957d651abef258f058b5d2ad997f232718345ae127d6d7d88
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD515dbbc53bf29f3d4ac782a29cab33b75
SHA1e671ad7b04230b974020ca4159fda97ce00ac924
SHA2561e3a76cc2dfa6d3587465d82b35159a23013d2743bc79668a3b73da5a6cfded7
SHA512a19afb9af80aa7dd933c5046d9abbe0b2abca8b817951eed960d0c6af887d649f7b20e05b0d950196c4f95a9218693cfcd20cf459a38b3834913bc91670a8a62
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\a2d12f3a-6b8b-4c33-80dd-2a60129e17ea
Filesize745B
MD5f2c0107defe8c9ceb002916d83b08ef7
SHA1cd815b2550a41d410e9a3ffa03c6e5b77d3351dc
SHA25626519c66d01a619b6e7fa2d4fea09d6ee1a94fe9c897d676b02e6d9adb72d78c
SHA51267baea586503ba0c21cbe5ba1c8deb7ff8b4faeed063ca4c89c263abbeb1c85c2715e1bb28b5921b0de2dc9d383219c132a3a595d2b118625515864fa41af726
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\f08361ad-8065-4652-87d0-6d597f1b345a
Filesize12KB
MD5c86807e1a0e6e547a031daa30b14eb84
SHA1f7b5efadcb4f18c279870cdc49272b46d122eaa2
SHA25692c86d04c6cb956491e8edb99fe273e407fbcc8e0596b2f29d03ff6e8ca7c1aa
SHA512c67824ddacde8423f1d28a6f38da81b35389db767ccdf4ab109b78b9714d39bab02a1641cbb465b815ef093144ae4057da38c581748d1e28a98e9e08a69ded36
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD54232349553eabf017b804d3820ae7c44
SHA14d0c02298e85a01e7638c427fbce7879ebb8e865
SHA256c24dab55344f8d06a38ee7839db7d472a2e47c11d58065d478f0bb4859e937d2
SHA5124e56e5f82d55054708ead83bd5f4cb2b0085e9b57f2a7f55388fedfd0df98407e36bc888957291504a16bc3ccd943154ffeef9fc04468b310cd577a0dc6af719
-
Filesize
7KB
MD5179a140716c5bfa4310caf06606a9a21
SHA1502a22aab30b6b8df44cb481f3a660d0834e23fb
SHA256b496bb685948a8494fd9c6e5b232d90db8da104f2b00488872073a0b2f43c176
SHA5127087321447cca6ac2696be96a1b8a58057ca69e3c5902f62f4c70bbd0f85eab72ea42b11693cf27ffe397b3befe202789f3912d753a698c4f9a5e2588bd809c0
-
Filesize
7KB
MD56f660310d130e9308be9af6f24c7917d
SHA175bdc29ca1ee679f0f78feec051f241814d43773
SHA2562ee69bcae7dcecdfbff049b635a9a1327004b4e7a9f2a811b90bae62bd71a055
SHA51276ed37049147b863a01639e3a1ffde0c060f346b6850255e7ea73148a8547b1292386301f4ce1a420db134274ee74f8691fcda3aa754fc622965c69bf1b066a7
-
Filesize
6KB
MD558bbd949c5c576a513f11d94a7397afc
SHA1c628d98851a6ba96c20f55ba86190c32e8229d49
SHA2563bcedbee938f65de108b39160c7eba0f9f75859695a61db6a435cff0492e370d
SHA512106825a55ac7aaa2172723f8e9b250df0adfd1df533300e9e570e0932cae013b24793fd863abe1e5598f06f716be3045181977891b45b93e4dd21f848e02fa32
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5ac5fd74af27637690c07698fca5a5520
SHA1e812c7310979cf43b93e16524eb6b99f34e5e440
SHA2566940387ec181b2d548b97f7a81ce176ca8a4650cbea54db13e2a41776ef66f0b
SHA512dfa23284324f5ed4f8467cfa3a74279e0fa8f0e717f465a75d5c93e5612e7176c54edc360e424470b7ea4686a1c90b5f406b8f9b99642e590ebb287a22f678a4
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
1.8MB
MD5ab6fe5323b404459fae6dce3b9c8a505
SHA164e54cf1d9546097a250fb30a47ed25db39332db
SHA25626f67d682cbc909491170ef1b76060ab895bd29546b18976c803ef5b2b65ab5e
SHA51277e5dde6b3b782ad2cfa4deea115c9eac78cd84c3e8844b6daa8281da85c446aaf9f6268734ef11fa4445bcd787aeadb3cc0380ce8a44ea024b9021c45b3d020
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
689KB
MD5e672d5907f1ce471d9784df64d8a306b
SHA16d094cae150d72b587c5480c15127d7059e16932
SHA2569f9250be71bd6254790a9630990f4560d53995db3d8737b7f49986e3551283e5
SHA5129cf10e997d8d99e6eb2f6ccac00ab365f63e03d96c2e2354fdf67683b85553a60cd9542cfb21cbea468c6a2bda454cde71937c0d21c4b738451b5e2c30690c39