Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe
Resource
win10v2004-20241007-en
General
-
Target
ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe
-
Size
3.1MB
-
MD5
2b3dca9f3f8f7b379021a041b731aed3
-
SHA1
e8fc7d977c0a76e25b1e69f4398a10fef83918d0
-
SHA256
ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24
-
SHA512
ce65473353253347788ed1d0641a6c6a3be815c50bd1046c1aa8bf827f48c0f09b61560f3aa3eeb8f641afa6d7a870dd68834615b3fe81b6f62a9ffee946f98a
-
SSDEEP
49152:QGzTfwucejjjsjgACxGnlEaX+IWYxR8SJe2cC9/1+F0U:Bzb20jIjgACxNyWCR8S42cC9/1+z
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dd94fa9303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dd94fa9303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dd94fa9303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dd94fa9303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dd94fa9303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dd94fa9303.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0tClIDb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 78c83a40ec.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2427caf3c8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dd94fa9303.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0tClIDb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 78c83a40ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2427caf3c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dd94fa9303.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2427caf3c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dd94fa9303.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0tClIDb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 78c83a40ec.exe -
Executes dropped EXE 11 IoCs
pid Process 2756 skotes.exe 1792 B3vKvPi.exe 904 callmobile.exe 4900 0tClIDb.exe 2068 wTMEVe8.exe 1964 ntRoEwh.exe 1592 callmobile.exe 1152 78c83a40ec.exe 3396 2427caf3c8.exe 1984 8b0d03025f.exe 684 dd94fa9303.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 0tClIDb.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 78c83a40ec.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 2427caf3c8.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine dd94fa9303.exe -
Loads dropped DLL 23 IoCs
pid Process 3064 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 3064 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 2756 skotes.exe 2756 skotes.exe 2756 skotes.exe 2756 skotes.exe 2756 skotes.exe 2756 skotes.exe 2756 skotes.exe 2756 skotes.exe 2756 skotes.exe 2756 skotes.exe 2756 skotes.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features dd94fa9303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dd94fa9303.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" B3vKvPi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ntRoEwh.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\78c83a40ec.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013244001\\78c83a40ec.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\2427caf3c8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013245001\\2427caf3c8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\8b0d03025f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013246001\\8b0d03025f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\dd94fa9303.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013247001\\dd94fa9303.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000186f2-2508.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3064 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 2756 skotes.exe 4900 0tClIDb.exe 1152 78c83a40ec.exe 3396 2427caf3c8.exe 684 dd94fa9303.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe -
pid Process 4920 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2164 904 WerFault.exe 34 2532 1592 WerFault.exe 40 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0d03025f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78c83a40ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language callmobile.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 8b0d03025f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0tClIDb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 8b0d03025f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd94fa9303.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language callmobile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2427caf3c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3128 taskkill.exe 3676 taskkill.exe 4108 taskkill.exe 4624 taskkill.exe 1288 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3064 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 2756 skotes.exe 4900 0tClIDb.exe 1152 78c83a40ec.exe 3396 2427caf3c8.exe 1984 8b0d03025f.exe 684 dd94fa9303.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 4920 powershell.exe 684 dd94fa9303.exe 684 dd94fa9303.exe 904 callmobile.exe 1592 callmobile.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 904 callmobile.exe Token: SeDebugPrivilege 1592 callmobile.exe Token: SeDebugPrivilege 3128 taskkill.exe Token: SeDebugPrivilege 3676 taskkill.exe Token: SeDebugPrivilege 4108 taskkill.exe Token: SeDebugPrivilege 4624 taskkill.exe Token: SeDebugPrivilege 1288 taskkill.exe Token: SeDebugPrivilege 1864 firefox.exe Token: SeDebugPrivilege 1864 firefox.exe Token: SeDebugPrivilege 4920 powershell.exe Token: SeDebugPrivilege 684 dd94fa9303.exe Token: SeDebugPrivilege 904 callmobile.exe Token: SeDebugPrivilege 1592 callmobile.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 3064 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1864 firefox.exe 1864 firefox.exe 1864 firefox.exe 1864 firefox.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1864 firefox.exe 1864 firefox.exe 1864 firefox.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe 1984 8b0d03025f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2756 3064 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 30 PID 3064 wrote to memory of 2756 3064 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 30 PID 3064 wrote to memory of 2756 3064 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 30 PID 3064 wrote to memory of 2756 3064 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 30 PID 2756 wrote to memory of 1792 2756 skotes.exe 33 PID 2756 wrote to memory of 1792 2756 skotes.exe 33 PID 2756 wrote to memory of 1792 2756 skotes.exe 33 PID 2756 wrote to memory of 1792 2756 skotes.exe 33 PID 1792 wrote to memory of 904 1792 B3vKvPi.exe 34 PID 1792 wrote to memory of 904 1792 B3vKvPi.exe 34 PID 1792 wrote to memory of 904 1792 B3vKvPi.exe 34 PID 1792 wrote to memory of 904 1792 B3vKvPi.exe 34 PID 2756 wrote to memory of 4900 2756 skotes.exe 35 PID 2756 wrote to memory of 4900 2756 skotes.exe 35 PID 2756 wrote to memory of 4900 2756 skotes.exe 35 PID 2756 wrote to memory of 4900 2756 skotes.exe 35 PID 2756 wrote to memory of 2068 2756 skotes.exe 37 PID 2756 wrote to memory of 2068 2756 skotes.exe 37 PID 2756 wrote to memory of 2068 2756 skotes.exe 37 PID 2756 wrote to memory of 2068 2756 skotes.exe 37 PID 2756 wrote to memory of 1964 2756 skotes.exe 39 PID 2756 wrote to memory of 1964 2756 skotes.exe 39 PID 2756 wrote to memory of 1964 2756 skotes.exe 39 PID 2756 wrote to memory of 1964 2756 skotes.exe 39 PID 1964 wrote to memory of 1592 1964 ntRoEwh.exe 40 PID 1964 wrote to memory of 1592 1964 ntRoEwh.exe 40 PID 1964 wrote to memory of 1592 1964 ntRoEwh.exe 40 PID 1964 wrote to memory of 1592 1964 ntRoEwh.exe 40 PID 2756 wrote to memory of 1152 2756 skotes.exe 41 PID 2756 wrote to memory of 1152 2756 skotes.exe 41 PID 2756 wrote to memory of 1152 2756 skotes.exe 41 PID 2756 wrote to memory of 1152 2756 skotes.exe 41 PID 2756 wrote to memory of 3396 2756 skotes.exe 42 PID 2756 wrote to memory of 3396 2756 skotes.exe 42 PID 2756 wrote to memory of 3396 2756 skotes.exe 42 PID 2756 wrote to memory of 3396 2756 skotes.exe 42 PID 2756 wrote to memory of 1984 2756 skotes.exe 43 PID 2756 wrote to memory of 1984 2756 skotes.exe 43 PID 2756 wrote to memory of 1984 2756 skotes.exe 43 PID 2756 wrote to memory of 1984 2756 skotes.exe 43 PID 1984 wrote to memory of 3128 1984 8b0d03025f.exe 44 PID 1984 wrote to memory of 3128 1984 8b0d03025f.exe 44 PID 1984 wrote to memory of 3128 1984 8b0d03025f.exe 44 PID 1984 wrote to memory of 3128 1984 8b0d03025f.exe 44 PID 1984 wrote to memory of 3676 1984 8b0d03025f.exe 46 PID 1984 wrote to memory of 3676 1984 8b0d03025f.exe 46 PID 1984 wrote to memory of 3676 1984 8b0d03025f.exe 46 PID 1984 wrote to memory of 3676 1984 8b0d03025f.exe 46 PID 1984 wrote to memory of 4108 1984 8b0d03025f.exe 48 PID 1984 wrote to memory of 4108 1984 8b0d03025f.exe 48 PID 1984 wrote to memory of 4108 1984 8b0d03025f.exe 48 PID 1984 wrote to memory of 4108 1984 8b0d03025f.exe 48 PID 1984 wrote to memory of 4624 1984 8b0d03025f.exe 50 PID 1984 wrote to memory of 4624 1984 8b0d03025f.exe 50 PID 1984 wrote to memory of 4624 1984 8b0d03025f.exe 50 PID 1984 wrote to memory of 4624 1984 8b0d03025f.exe 50 PID 1984 wrote to memory of 1288 1984 8b0d03025f.exe 52 PID 1984 wrote to memory of 1288 1984 8b0d03025f.exe 52 PID 1984 wrote to memory of 1288 1984 8b0d03025f.exe 52 PID 1984 wrote to memory of 1288 1984 8b0d03025f.exe 52 PID 1984 wrote to memory of 2112 1984 8b0d03025f.exe 54 PID 1984 wrote to memory of 2112 1984 8b0d03025f.exe 54 PID 1984 wrote to memory of 2112 1984 8b0d03025f.exe 54 PID 1984 wrote to memory of 2112 1984 8b0d03025f.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe"C:\Users\Admin\AppData\Local\Temp\ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\callmobile.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\callmobile.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 904 -s 6165⤵
- Loads dropped DLL
- Program crash
PID:2164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\1013238001\wTMEVe8.exe"C:\Users\Admin\AppData\Local\Temp\1013238001\wTMEVe8.exe"3⤵
- Executes dropped EXE
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\1013239001\ntRoEwh.exe"C:\Users\Admin\AppData\Local\Temp\1013239001\ntRoEwh.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 6165⤵
- Loads dropped DLL
- Program crash
PID:2532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013244001\78c83a40ec.exe"C:\Users\Admin\AppData\Local\Temp\1013244001\78c83a40ec.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\1013245001\2427caf3c8.exe"C:\Users\Admin\AppData\Local\Temp\1013245001\2427caf3c8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\1013246001\8b0d03025f.exe"C:\Users\Admin\AppData\Local\Temp\1013246001\8b0d03025f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2112
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1864 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1864.0.625787387\785017775" -parentBuildID 20221007134813 -prefsHandle 1204 -prefMapHandle 1148 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {43c1f451-3d88-4d13-bc6e-5b254a4b4fa3} 1864 "\\.\pipe\gecko-crash-server-pipe.1864" 1280 110cd858 gpu6⤵PID:3316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1864.1.1882327981\1688474253" -parentBuildID 20221007134813 -prefsHandle 1468 -prefMapHandle 1464 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b727aff5-c87e-4bdf-8c4d-afba28885480} 1864 "\\.\pipe\gecko-crash-server-pipe.1864" 1480 f9f9258 socket6⤵PID:3664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1864.2.1325577127\298489421" -childID 1 -isForBrowser -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fc3d986-3753-483f-b035-36ccd3007353} 1864 "\\.\pipe\gecko-crash-server-pipe.1864" 2044 19cb4258 tab6⤵PID:2820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1864.3.561170250\294802173" -childID 2 -isForBrowser -prefsHandle 2912 -prefMapHandle 2908 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {264e13ab-a1fc-4b9e-8126-4d21a4b8208e} 1864 "\\.\pipe\gecko-crash-server-pipe.1864" 2924 e62758 tab6⤵PID:4528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1864.4.1027251155\693535121" -childID 3 -isForBrowser -prefsHandle 3732 -prefMapHandle 3736 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {44397423-8b64-4184-beec-32b36990a936} 1864 "\\.\pipe\gecko-crash-server-pipe.1864" 3380 1cdb0358 tab6⤵PID:1524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1864.5.790233875\2115098238" -childID 4 -isForBrowser -prefsHandle 3840 -prefMapHandle 3844 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {88068e53-bb73-4586-921c-84cdef532381} 1864 "\\.\pipe\gecko-crash-server-pipe.1864" 3828 204c6b58 tab6⤵PID:2576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1864.6.551785299\404286569" -childID 5 -isForBrowser -prefsHandle 4008 -prefMapHandle 4012 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {90d84606-e499-4f64-99d3-bcddeda0ed18} 1864 "\\.\pipe\gecko-crash-server-pipe.1864" 3996 204c6258 tab6⤵PID:272
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013247001\dd94fa9303.exe"C:\Users\Admin\AppData\Local\Temp\1013247001\dd94fa9303.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1013248041\KeaEfrP.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD575f6e8b4105fa9fede84f65f6800f093
SHA109a71ef491c7440f2eb836cf6d7169f6e40ba064
SHA25659e2066df7f8d5151618f0f6f1efb59df9ca4f5f2a5e8c1cf0d0768061ce7fb4
SHA5123b88d43a17fd008553e9784d7843b15655bf1e239b91cd8046237bd4452acd3fcd24d493b4e799d83380f7295aed4f5f389d423075b74673f5e8b5125826469f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.2MB
MD53541c1ac26eb5bbb87f01c20fd9f8824
SHA1bf5d136c911491f59bdeb3bf37b8f1a155fd3a97
SHA256b7cd929ce4d0fa849eeab8a216e1333f63c7d3530da674f163efab4dae3439d1
SHA512babc17723d2389919acd96f977821d57bdd737f01a9598209efafa72ae0418e914a5d229f196d80cb5ba70ce82b0f340b18aa255bbe4ed77d821a432d5794a93
-
Filesize
1.8MB
MD56367fb8a64f997be8d65536534bdd057
SHA13ee062142dde2330881566a63a92957037a0e6b3
SHA256bdae46a5cb1f1b6b9864b5e944ed5b2e24622d7385a196e0293f7b9da59bda5e
SHA512ace2dbba313180a64f70f49c7763fb9da23ef76b82548c8fa54a7d1e8d4810cad83726fe532459660e12e4f6a9210df09dd836ea28f1cc5a791a4873b95a274c
-
Filesize
3.9MB
MD55db95c4de9b6e98c653ac3dec5dce83d
SHA1c3e1cb98b5450d21c8e9e975148c282afcf4ccae
SHA2568ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7
SHA51242e5504904f0db4e62d56c03c8e7e302df0eba488a966259aa686e7d952db8a25eb56b5ac72731400cfd2541b6429d82e95e3bb8e87565bdf0cbe2b488c47368
-
Filesize
1.8MB
MD5c42fbc53b1b42194728f4f5904cc925a
SHA1e62e1d938f9a9be31f3ccb82ece3997354df132b
SHA25646253c842675dfbc5fc9c852bcf64e6d6175b6efe9d81774b6d84e42a3be9cb9
SHA512e833b0fa711fd4bfaf3f00c1d816b4f7988959f445509089f4795f4d6a419aed154b2d33cb71ea49e918c82ba0545d70a36eed8687597378b0065817f8bb5f95
-
Filesize
1.7MB
MD57dcf4c4df2997ccd8c4a0fd2398b784a
SHA17f623f31d30a0d45058eeaa38f12ecf43f54fd33
SHA2564c2d2f9f76daff7560ac8bf55c348f7051216db171fba2a25f7ac939410b7cff
SHA512697dbc4f0cda3affdfcf0639b53de8a67273cd4ff3e356236277cb2851c6c24be67c4b6ed51bc1229a842ddbd53231b07d2b9dba2d484447240066ad32845d1b
-
Filesize
948KB
MD5ea332702c8adf6f8be3dd834363924bd
SHA1eaf972aeb4a0eebeede9b2a53c48670965af4d17
SHA2563b609f119a3ac3d881d7e2e7bf637618500e6d5afe0b65f9087b6653cbbc42eb
SHA51202662320d09805f2a09fd7431576a7b70c83fdc2ea6a139e53c23509705659b4a9034f135383166b0c0d0f3777f0220a53d2e7a02a2a1642af96eb0030cb44fc
-
Filesize
2.7MB
MD5ed56e3fd052ff78dc552adc8c68c1ae1
SHA1a3ec743c5faf04b546213f35d186599704da24c3
SHA256d4a86adb78b87482ffaf354bdddfd4b0db486b10de088f923851c23e25f7813b
SHA512975391c94d487377d5c3c240a9f83b8edaad51f9cab4bfb6f7705a23ab8a0435961bde4f3469f30b3c1c351586f4d664a091eb3584bd21c33524735fbc3e7556
-
Filesize
2KB
MD562e668d5993865a150073479bdc42ec5
SHA1b2b4e7767c5b0c9218127401c8d8b8723148ffc7
SHA256ea4b7480d291e1e3ec6029bc92c3c732d005ad215518e8c483388b8227f4dd52
SHA5126ba4fe44398b89a82804013151a73f4aa00be9468d76cf2b40fe7a410c4d646c84ab10f2561fed694ee0b3a24bd50f46a75427097996be171a83f671196b0cbc
-
Filesize
2.3MB
MD5ffabcc262fb699998b6191d7656c8805
SHA1fd3ea79a8550b14e9cc75fb831fd7a141964a714
SHA256f46e4a7de978baceec5f64cbc9fa1f1e772e864fa3310045cd19d77264698cde
SHA51279b2e21a9111b16b0f67ae5d1cc40a25773b847d3f4cf78711a8dfd8b67c30beec332ed65ac008c9dca62c84de891eff20d7c6050bc868bce77a17fe56da61ba
-
Filesize
3.1MB
MD52b3dca9f3f8f7b379021a041b731aed3
SHA1e8fc7d977c0a76e25b1e69f4398a10fef83918d0
SHA256ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24
SHA512ce65473353253347788ed1d0641a6c6a3be815c50bd1046c1aa8bf827f48c0f09b61560f3aa3eeb8f641afa6d7a870dd68834615b3fe81b6f62a9ffee946f98a
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5ba0763d4f96d8dab974f8ae6f1e937b2
SHA15cfc302c4f569507beae68775d6c6bd25e4999cf
SHA256a32ddd799482a64ec2c05fe9536a980890d3a7144b5acc64fa512551d16f700b
SHA512daa4e149e691372c5990579d4911547035f368205ea735eb51a98748d4bd57b774ac689cddc7ff1526aeae6fdf4f5958ba99d8de5bd5a910064a611229d6919f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\80e7919d-90e5-47ca-8444-778326d8aa30
Filesize745B
MD597df97229d034ec347463058d48aea7d
SHA16e1490a40efb7baa1932ebe64e3cd5dc45250403
SHA2561b41c2c3b1dea23e3da0c61c2f8a49fa74945739df331ce976257912694bf7a8
SHA5120f9d9bca31ffe20906cfc914d2f644605f13ff59a74a61242df500f5020565aa925c977ace906f5c8889b1e70eb577677260440e27c807355e024d0734f79d04
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\99fc8ab0-685a-495b-be6e-61f5d8135853
Filesize12KB
MD5176da93def6bdfc1332c9f2523556d13
SHA1da5097160a71ccd1753985e2f5643eedb88c32e0
SHA256fb6c77b7b00e54444a8154639912c4ec23d0423342046c7d79cd475eb6e9c0cd
SHA512c0774dbd57af5e8214e3afbb0c1439b39c989f46f125bc809989e143e2fd9bd996bb394d3d960527216796cf0dc1ac21172a4117fe8c5fae35d70603615be9c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD56f20b1d9657531a9fbb7a77d37936199
SHA1ce4b0eb42cc6cc2bbe5eb334bebc75c5685cffbc
SHA2562b9dd2283e93a62029e43ee8f930e6c5d10641dc877206f97ebe2ab9038fba3e
SHA5124ef551071639b5190a41009d1224da7be7f71aef50fa901d1d4b825eca156308a8eaaa839fb5329873f3ca0739099cce95800919af2f508da5fdc4f1f0b104ab
-
Filesize
7KB
MD5d3a62a77031e86ac8bf2320330305c05
SHA1acc89b0adc68779f2ce8c0357d385396a2be49ec
SHA2560930914de46e93424525e2bdb430a21e67452a9aeccbbfb5b560a638edca3ca5
SHA512af2e47f480b9e74c5d7e53fe1f2264fd5a2b83fd974343ef96d1541294bb72dba98d12820be1fc6c742243e5b3602558dcc16604dd9d801a2877aaf4131fa0f6
-
Filesize
6KB
MD514702774e53c64d7bfee5dc67ca24b2f
SHA131d2c9a0717a4747dbdc88da9421350781ede382
SHA256fd156a3827d5463a093aa11b95f26269a356eb79e0006d26dc67d78b6336d0ca
SHA512c76ff3d79d9271b10c516cf1fc5ffeae7bb0fafc0280dab123174f6341f9f68a4e72550b8872fe6a4ba54735521880383ad1cef886c619ba666cd5f0cfcec38b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD52d51833052dc89054327529a2ea36023
SHA1b0c06356af6cf9ce1f85577504c34e515d0f1abd
SHA256dcc511bf10f44c31bee2d60abf52945933b1fe88391ec7cf90ba0789a4f57e8a
SHA512b6b4895e35111911492210fb332b0b67f5155a09750346bae2021958ca135625070475cf5ac528f0ddb50d90cef0d17adac0a2ef980998b4fb7e7d665324c196