Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
68d337cefd0d798eae5bb67dabd97d11
-
SHA1
a2c97610906991a227e52ccb7fc55fe8c2fe8774
-
SHA256
8fc1bd816b1865518ff0620f8ac09a85aa3d8c5d660ba423b7d13b09f325baa9
-
SHA512
0ae6f81307950d38c7fc78237720bbd55bac9244afe74101e12be868ab6f0c3a7bfaa641aa636a947e3c4934510200ebee2a2057eb5c37f98a3b4887d5e43929
-
SSDEEP
49152:RTprX81PKH6J3vRPlf7CncYrHDsGaaaH9gUNbWIXrwg65t:T81PKaJ3vRN2ncYrH+dFB8g
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection d968a3a387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d968a3a387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d968a3a387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d968a3a387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d968a3a387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d968a3a387.exe -
Stealc family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ adb4654eb6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d6aaff40a3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d968a3a387.exe -
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/2080-391-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2080-392-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2080-397-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2080-396-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2080-398-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2080-395-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2080-394-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2080-413-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3724 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d6aaff40a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d968a3a387.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion adb4654eb6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion adb4654eb6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d6aaff40a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d968a3a387.exe -
Executes dropped EXE 7 IoCs
pid Process 2760 skotes.exe 1036 hIPhQZD.exe 2912 adb4654eb6.exe 1312 d6aaff40a3.exe 1056 34e3814a34.exe 1788 d968a3a387.exe 3428 WindosCPUsystem.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine adb4654eb6.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine d6aaff40a3.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine d968a3a387.exe -
Loads dropped DLL 11 IoCs
pid Process 2128 file.exe 2128 file.exe 2760 skotes.exe 2760 skotes.exe 2760 skotes.exe 2760 skotes.exe 2760 skotes.exe 2760 skotes.exe 2760 skotes.exe 2864 explorer.exe 2864 explorer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features d968a3a387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d968a3a387.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\d968a3a387.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013208001\\d968a3a387.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\adb4654eb6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013205001\\adb4654eb6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\d6aaff40a3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013206001\\d6aaff40a3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\34e3814a34.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013207001\\34e3814a34.exe" skotes.exe -
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4036 powercfg.exe 4028 powercfg.exe 4020 powercfg.exe 4012 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000193c8-104.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe WindosCPUsystem.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2128 file.exe 2760 skotes.exe 2912 adb4654eb6.exe 1312 d6aaff40a3.exe 1788 d968a3a387.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3428 set thread context of 2080 3428 WindosCPUsystem.exe 84 -
resource yara_rule behavioral1/memory/2080-391-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-392-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-390-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-389-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-388-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-387-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-386-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-397-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-396-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-398-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-395-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-394-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2080-413-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3872 sc.exe 3904 sc.exe 3936 sc.exe 3980 sc.exe 3836 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 34e3814a34.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 34e3814a34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6aaff40a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34e3814a34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d968a3a387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hIPhQZD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb4654eb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2300 taskkill.exe 2208 taskkill.exe 892 taskkill.exe 2348 taskkill.exe 1664 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2128 file.exe 2760 skotes.exe 2912 adb4654eb6.exe 1312 d6aaff40a3.exe 1056 34e3814a34.exe 1788 d968a3a387.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1788 d968a3a387.exe 1788 d968a3a387.exe 3428 WindosCPUsystem.exe 3724 powershell.exe 3428 WindosCPUsystem.exe 3428 WindosCPUsystem.exe 3428 WindosCPUsystem.exe 3428 WindosCPUsystem.exe 3428 WindosCPUsystem.exe 3428 WindosCPUsystem.exe 3428 WindosCPUsystem.exe 3428 WindosCPUsystem.exe 3428 WindosCPUsystem.exe 3428 WindosCPUsystem.exe 3428 WindosCPUsystem.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 1036 hIPhQZD.exe 1036 hIPhQZD.exe 1036 hIPhQZD.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2300 taskkill.exe Token: SeDebugPrivilege 2208 taskkill.exe Token: SeDebugPrivilege 892 taskkill.exe Token: SeDebugPrivilege 2348 taskkill.exe Token: SeDebugPrivilege 1664 taskkill.exe Token: SeDebugPrivilege 2824 firefox.exe Token: SeDebugPrivilege 2824 firefox.exe Token: SeDebugPrivilege 1788 d968a3a387.exe Token: SeDebugPrivilege 3724 powershell.exe Token: SeDebugPrivilege 3428 WindosCPUsystem.exe Token: SeShutdownPrivilege 4020 powercfg.exe Token: SeShutdownPrivilege 4028 powercfg.exe Token: SeShutdownPrivilege 4036 powercfg.exe Token: SeShutdownPrivilege 4012 powercfg.exe Token: SeLockMemoryPrivilege 2080 explorer.exe Token: SeLockMemoryPrivilege 2080 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2128 file.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 2824 firefox.exe 2824 firefox.exe 2824 firefox.exe 2824 firefox.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 2824 firefox.exe 2824 firefox.exe 2824 firefox.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 1056 34e3814a34.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe 2080 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2760 2128 file.exe 31 PID 2128 wrote to memory of 2760 2128 file.exe 31 PID 2128 wrote to memory of 2760 2128 file.exe 31 PID 2128 wrote to memory of 2760 2128 file.exe 31 PID 2760 wrote to memory of 1036 2760 skotes.exe 33 PID 2760 wrote to memory of 1036 2760 skotes.exe 33 PID 2760 wrote to memory of 1036 2760 skotes.exe 33 PID 2760 wrote to memory of 1036 2760 skotes.exe 33 PID 1036 wrote to memory of 2864 1036 hIPhQZD.exe 34 PID 1036 wrote to memory of 2864 1036 hIPhQZD.exe 34 PID 1036 wrote to memory of 2864 1036 hIPhQZD.exe 34 PID 1036 wrote to memory of 2864 1036 hIPhQZD.exe 34 PID 2760 wrote to memory of 2912 2760 skotes.exe 35 PID 2760 wrote to memory of 2912 2760 skotes.exe 35 PID 2760 wrote to memory of 2912 2760 skotes.exe 35 PID 2760 wrote to memory of 2912 2760 skotes.exe 35 PID 2760 wrote to memory of 1312 2760 skotes.exe 37 PID 2760 wrote to memory of 1312 2760 skotes.exe 37 PID 2760 wrote to memory of 1312 2760 skotes.exe 37 PID 2760 wrote to memory of 1312 2760 skotes.exe 37 PID 2760 wrote to memory of 1056 2760 skotes.exe 38 PID 2760 wrote to memory of 1056 2760 skotes.exe 38 PID 2760 wrote to memory of 1056 2760 skotes.exe 38 PID 2760 wrote to memory of 1056 2760 skotes.exe 38 PID 1056 wrote to memory of 2300 1056 34e3814a34.exe 39 PID 1056 wrote to memory of 2300 1056 34e3814a34.exe 39 PID 1056 wrote to memory of 2300 1056 34e3814a34.exe 39 PID 1056 wrote to memory of 2300 1056 34e3814a34.exe 39 PID 1056 wrote to memory of 2208 1056 34e3814a34.exe 41 PID 1056 wrote to memory of 2208 1056 34e3814a34.exe 41 PID 1056 wrote to memory of 2208 1056 34e3814a34.exe 41 PID 1056 wrote to memory of 2208 1056 34e3814a34.exe 41 PID 1056 wrote to memory of 892 1056 34e3814a34.exe 43 PID 1056 wrote to memory of 892 1056 34e3814a34.exe 43 PID 1056 wrote to memory of 892 1056 34e3814a34.exe 43 PID 1056 wrote to memory of 892 1056 34e3814a34.exe 43 PID 1056 wrote to memory of 2348 1056 34e3814a34.exe 45 PID 1056 wrote to memory of 2348 1056 34e3814a34.exe 45 PID 1056 wrote to memory of 2348 1056 34e3814a34.exe 45 PID 1056 wrote to memory of 2348 1056 34e3814a34.exe 45 PID 1056 wrote to memory of 1664 1056 34e3814a34.exe 47 PID 1056 wrote to memory of 1664 1056 34e3814a34.exe 47 PID 1056 wrote to memory of 1664 1056 34e3814a34.exe 47 PID 1056 wrote to memory of 1664 1056 34e3814a34.exe 47 PID 1056 wrote to memory of 2268 1056 34e3814a34.exe 49 PID 1056 wrote to memory of 2268 1056 34e3814a34.exe 49 PID 1056 wrote to memory of 2268 1056 34e3814a34.exe 49 PID 1056 wrote to memory of 2268 1056 34e3814a34.exe 49 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2268 wrote to memory of 2824 2268 firefox.exe 50 PID 2824 wrote to memory of 2544 2824 firefox.exe 51 PID 2824 wrote to memory of 2544 2824 firefox.exe 51 PID 2824 wrote to memory of 2544 2824 firefox.exe 51 PID 2824 wrote to memory of 836 2824 firefox.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\1013196001\hIPhQZD.exe"C:\Users\Admin\AppData\Local\Temp\1013196001\hIPhQZD.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
PID:2864 -
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {D4D7F2EA-38C9-468B-BF0E-B76E00A488F0}5⤵PID:3268
-
-
C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe"C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe" ""5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart6⤵PID:3828
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart7⤵
- Drops file in Windows directory
PID:3888
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc6⤵
- Launches sc.exe
PID:3836
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:3872
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv6⤵
- Launches sc.exe
PID:3904
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits6⤵
- Launches sc.exe
PID:3936
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc6⤵
- Launches sc.exe
PID:3980
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\explorer.exeexplorer.exe6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2080
-
-
-
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {D4D7F2EA-38C9-468B-BF0E-B76E00A488F0}5⤵PID:3604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013205001\adb4654eb6.exe"C:\Users\Admin\AppData\Local\Temp\1013205001\adb4654eb6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\1013206001\d6aaff40a3.exe"C:\Users\Admin\AppData\Local\Temp\1013206001\d6aaff40a3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\1013207001\34e3814a34.exe"C:\Users\Admin\AppData\Local\Temp\1013207001\34e3814a34.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2824.0.1798584152\975572112" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eea2b133-fd3d-48d9-9eee-fc3394cb735e} 2824 "\\.\pipe\gecko-crash-server-pipe.2824" 1284 120d6458 gpu6⤵PID:2544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2824.1.833036290\1118246176" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b5c758b-5daf-4c14-a87d-ee9844cb6dae} 2824 "\\.\pipe\gecko-crash-server-pipe.2824" 1500 e74e58 socket6⤵PID:836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2824.2.616048260\46380418" -childID 1 -isForBrowser -prefsHandle 2080 -prefMapHandle 2076 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b62117a-c0c1-475c-9370-d96e480d8d7a} 2824 "\\.\pipe\gecko-crash-server-pipe.2824" 2092 1a5b5358 tab6⤵PID:1364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2824.3.1365286815\1832766511" -childID 2 -isForBrowser -prefsHandle 2888 -prefMapHandle 2884 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {247fc4a6-6922-4f49-8c0e-6a25b2384e7a} 2824 "\\.\pipe\gecko-crash-server-pipe.2824" 2900 e64b58 tab6⤵PID:2528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2824.4.1212904107\1612375036" -childID 3 -isForBrowser -prefsHandle 3772 -prefMapHandle 3692 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c73f7168-27ad-4167-8ada-1e25c0b75444} 2824 "\\.\pipe\gecko-crash-server-pipe.2824" 3780 213eb258 tab6⤵PID:956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2824.5.76251379\45298783" -childID 4 -isForBrowser -prefsHandle 3888 -prefMapHandle 3892 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5ce3606-6206-4316-bf4a-087c8a306a6a} 2824 "\\.\pipe\gecko-crash-server-pipe.2824" 3876 213eb858 tab6⤵PID:1488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2824.6.794066689\94226294" -childID 5 -isForBrowser -prefsHandle 4052 -prefMapHandle 4056 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0a18bb1-9313-4ba2-9ba3-93d2499b88a7} 2824 "\\.\pipe\gecko-crash-server-pipe.2824" 4040 21517558 tab6⤵PID:1692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013208001\d968a3a387.exe"C:\Users\Admin\AppData\Local\Temp\1013208001\d968a3a387.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5fa235f3abd795019b402d671deb7bcd3
SHA1bd9416221b33dc36aa3e665d797e73fbde8b7207
SHA256fa02ff6d2b230334eab9c2435b44077d6aa1ef0475bc907cc09e228f5d0872bf
SHA512517998ee72eac624bf00ac707d1ee002ae430799385c59132cf61f876dce5686a0c8bdd45a19378a9bcf334c089f48fff07099bf37391cbeccd08b91e5ccc682
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
503KB
MD505bbeba85b66e05630ab53abe2f0864e
SHA15181b7d8e9ec8946ad3256b1b400e2f570dae8da
SHA256c2ee598db573b89211027b5607fb6561742991be3b9d5ed9e413a3c3d35da01b
SHA5123cfaacdc097d9d2bc866bf56bdce87647496b53e76415754e7269e611dfc4fe1b94a0674041dbbb24ab4366ae171fb3e1bdb1074b8eaf31f7f625a308c19da75
-
Filesize
1.8MB
MD5cd50f89bc78fc345fc42bed4f58b62a4
SHA1b3c8b6d64dd5f1340d0dc2e941537ceb2c2f8603
SHA256c2334c4ca0081adc9d3837249f757adc34e8e852fd5f09fc58b6905b4a50ea66
SHA512e31a6e2fa2c7e71bd7df699ec89d2dc4db0de2061bc7e1b685f352c93a99696502513e167fe5de7837502e2c32e275a3a94e6af93357df37dcd64997585d678d
-
Filesize
1.7MB
MD55282d7feebf600d675b428a5ae1f000c
SHA1d693c04b717704567d1e9165997e9c2fddd1b7f8
SHA2565af770df514a795074bf7c7baac9ce29f273da59c8a261664dc5eec3d35d1c28
SHA51239dcb5229d161cb9b951e241500374211e312558f50d6efb9a69a65e5acdae4363ee3ae14fd5f5a3817beed632f4918ace3614e519b0d2bbe8171b9c2131cb54
-
Filesize
947KB
MD50058d7be87c904c115a5dda9b7be5871
SHA1b960f0014cf0007b255021c957fe702f35f80f34
SHA2562115b25b75548379efe953476c966664483028eaa6d9aa620bb4577c533dca74
SHA5128cc073fcdca2acbaf094636c5e076c1be40fe17c7789d3692e0ff7d3d846d0bb617f5c5a8a6a1cfcc5539fd992a56a221e97bc97ea2d564ae2eb3771c7c775d2
-
Filesize
2.6MB
MD5c01830fa6ef79094622198f19113a8e5
SHA137fbf9a9a4e64aab140666af606c1f61326518a2
SHA2564e07c31165cb3f20aaf852290c5e867cdc4d0b141c7904155a1a0475c0f2f0ea
SHA512be940a0b8c09b52be8d36351c798828dca0ee8c1b9d207d8d9eb0cb6b1fcd5d8689d376fe0ff98ba52b086de01c344ad67a73a4683a41b62faff9d31e82c23da
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
Filesize
224KB
MD5b9f47ec4226eedef84214a7f46a974ad
SHA1d83e37a6aacd187269ee3f1090dbb2f468c5edf9
SHA256239173ec475d7cc0a70457218e72af8e25bb33de4c03d57050d9055a550b14c4
SHA512523ae8fdc6a89b71871cc503b4b30763a787e662973fb9a2bd969486c303e1df6d1eaaae7ef4ee80881954921a44c407d0984e061812776b04b1a1c0977a9d69
-
Filesize
224KB
MD52d432555843a72313ca7062e02c2a669
SHA1f570e8cdf5e67176e762fea8f468a7a9b9578ac7
SHA2561aefa9141214c152b09d16eb83ba5c1f124bdfc089a417e79fd2ac88c035bd03
SHA512bcb7bc1f02e70ac1777da2032f999ef88912ec2e910a8a6a56f5889af37e6207d8cd4103435c30ea683e2071e3df355a821af921fa0c8bc9abaf45d82f85389e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD52245f5767b4c48de53656036b8a8c5a2
SHA164246bb12d4f7f3a368a0bf02d46c948022f294e
SHA256938043f5d1e2607c7734bdcc20adc32510e0200a4d1910ee8a217a402798b910
SHA512f7108931f8808725826a324953187c7e1cdc6cc97f78b77aefe98c91db75b154693d749d9862149dcb4fe69aa2104f8327d819ae1f498f9ca47f11ad1e342557
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\0b793149-6dd2-427b-9069-0929eb08624c
Filesize11KB
MD5f6fec575405485319202bddf72c63aa6
SHA1708744a0398d23e19ffaa2696acf106da5082f37
SHA2568087f5671fdca9bed52844f459f33b4db0373e42d1bdc23cf35ce4b347add295
SHA512ffee0e018a575ee1dd285b9ecab32aec92b09e12bcf5fa635704d4ee6bc8ceb542a7495dede94a7ad477afb6af230e20ef917a48edd825cb168e9de0a36cf107
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\2c699c7b-17ee-409b-a8eb-e76ea8d287a5
Filesize745B
MD516d11b511097f41d2c56d6171f9cd590
SHA1f1fb0c56474935c5a824a826338da47643e1813e
SHA256d1eac36ff0abc541e10f9f656902d68319536f03672f5c48e158eea479b623d1
SHA512531a167a7372d683a679680ee39fb19219951ac59222355a3ee70b32e8e05221bc82f09a7b77a935d39be8fc498ffafc95a6dfdf84bb74e68c7c194232e7a17c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD52967cf650f03a6e156bf585b4a63405a
SHA15178563c65e6d3d0b4fc044002378a280744d0be
SHA256d43c373b272ef84d45b99e66171a69b9c55d046ee9d65b821673d539ec7424ef
SHA512ae1bcfbc35a2412d37d9529619fb0057cb9fe9e6678695dc09761eb4003f00b99ab31a8945c4ea9bc46d142d4e7e97b6a14f8ca0e378a946b7db60db351f1efe
-
Filesize
7KB
MD578275fa86db70b388b4f0a742bdb676b
SHA1537d281088f2e9cbfd26d8571e882ad1ae64805c
SHA25660be02388f674fffc20b49c389415b116a87d2c2f28dcf6b1387d565d8c29784
SHA512e7d8493da1feb9edbed34fdde485346d1bc0cb47c7ff53809cab95b9699a3c6a915b6f7f886a2990a0a8da6c50f9886722ecc0356bbdbc3da8bd77d4840efe30
-
Filesize
6KB
MD55debde27ef16c35476484eb2f0901b53
SHA1a69511ca904feb834a0cb353cceac741c1f525b7
SHA2569a054baf513cc395482d42d477287a441ffb080f95f283e091daa19203798569
SHA51213a1c2bd8d55d2fc197a9b832192405a5ed85a995090a0d02f687494b2b70990e068fec0b15c4cc2d6c8c78343bce4e44ee0399be07cfe884dca82e479b7180b
-
Filesize
6KB
MD558a34515152ad20e1f850f9ef57ac3e7
SHA11564c195c7f6627de2208d7c04f62fd0c04ff7fd
SHA2566b85a38fe48ae2fb1036af5c5ff7ee693a6a094da536096c73433628f744398f
SHA51212fa40731834de91e924ee3d7a4d2c810de3187f9592b0fecac1b17321f23a3df9c2603469057392394073820e760ea177ba2bcbe82b43b2959a3fe1a7e1a5e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD594800641fd4002b72c20b7b2fd2b7cc0
SHA1e04156fb1dcb6e3d63c3f854544c3c3c1ef77966
SHA2561c575b3e3fd9d39be2a076f8cefb4c87fc53646ca7306b431caf3221d61ae9df
SHA512886882539c039624853b9fa988ac0de19fe65b55ea06c848267b18dc7d107d92cab1b5e6a65f85dafbf28fbca87180b6fad10a2fa663d8525e1905c1ef194630
-
Filesize
2.5MB
MD5fd863bab145a20d25e45177da0e56efc
SHA1ed8b0421b30b2d3783dd1a4fcdce6e6860d7f6ad
SHA2569e96bfa5e3159b7b0beaa0c8a46a1783c900934aae56193e26eff8d4d85777a7
SHA5129a51e4cf363349df1e831153c107ed9caa75e0f6536e622585bc85531c1038a24be8fba0eee0d56dbbde3d3b116163467c8f8788d89af801f9c287ca294a6a64
-
Filesize
3.1MB
MD568d337cefd0d798eae5bb67dabd97d11
SHA1a2c97610906991a227e52ccb7fc55fe8c2fe8774
SHA2568fc1bd816b1865518ff0620f8ac09a85aa3d8c5d660ba423b7d13b09f325baa9
SHA5120ae6f81307950d38c7fc78237720bbd55bac9244afe74101e12be868ab6f0c3a7bfaa641aa636a947e3c4934510200ebee2a2057eb5c37f98a3b4887d5e43929