Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
3.2MB
-
MD5
8310dd77fc508989327b7242d9f00757
-
SHA1
0f47666d19e93f838bf9e2d67a1a0c42dd2561f2
-
SHA256
306e3f1775f8481fe89d3575b57d8bcab355e9d55d1b66cbf7b246f8bd2a3dd0
-
SHA512
279770c1ae7698765dca0a7d4cffb6695381f8513ac12283c6e77b80cfd198d2a16c1ed12854f17ca8f91089632bbae65278bf8d157ec01fc3538cdc4416e697
-
SSDEEP
49152:eKsUSrfMdl+qB2OAS4aNPTET48NqCnf9lZOUdcczoJ:eTUqMdQshAS4aNP58NqClPdw
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
quasar
1.4.1
Office04
45.200.148.155:6060
4b3820e0-d123-49d9-b51e-3c4daa4f6874
-
encryption_key
F8879E9B26846C57C99B6F152F74703E1CC15B8B
-
install_name
SecurityHealthSystray.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SecurityHealthSystray.exe
-
subdirectory
SubDir
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 83469d6ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 83469d6ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 83469d6ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 83469d6ad3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 83469d6ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 83469d6ad3.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3428-1311-0x0000000000320000-0x0000000000AB6000-memory.dmp family_quasar behavioral1/memory/3428-1312-0x0000000000320000-0x0000000000AB6000-memory.dmp family_quasar -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0tClIDb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kelyBT9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 55dd833b1e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f79a21ef1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 83469d6ad3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kelyBT9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 83469d6ad3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0tClIDb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kelyBT9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 55dd833b1e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f79a21ef1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 83469d6ad3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 55dd833b1e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f79a21ef1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0tClIDb.exe -
Executes dropped EXE 12 IoCs
pid Process 2720 skotes.exe 2940 B3vKvPi.exe 2956 callmobile.exe 4780 0tClIDb.exe 1600 main.exe 2896 main.exe 1188 Process not Found 3428 kelyBT9.exe 4072 55dd833b1e.exe 1940 0f79a21ef1.exe 3356 ec11b045b2.exe 1936 83469d6ad3.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine kelyBT9.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 55dd833b1e.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 0f79a21ef1.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 83469d6ad3.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 0tClIDb.exe -
Loads dropped DLL 20 IoCs
pid Process 2548 file.exe 2548 file.exe 2720 skotes.exe 2720 skotes.exe 876 WerFault.exe 876 WerFault.exe 876 WerFault.exe 876 WerFault.exe 876 WerFault.exe 2720 skotes.exe 1600 main.exe 2896 main.exe 1188 Process not Found 2720 skotes.exe 2720 skotes.exe 2720 skotes.exe 2720 skotes.exe 2720 skotes.exe 2720 skotes.exe 2720 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 83469d6ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 83469d6ad3.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" B3vKvPi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\55dd833b1e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013272001\\55dd833b1e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\0f79a21ef1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013273001\\0f79a21ef1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\ec11b045b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013274001\\ec11b045b2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\83469d6ad3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013275001\\83469d6ad3.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001a4a2-1372.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2548 file.exe 2720 skotes.exe 4780 0tClIDb.exe 3428 kelyBT9.exe 4072 55dd833b1e.exe 1940 0f79a21ef1.exe 1936 83469d6ad3.exe -
resource yara_rule behavioral1/files/0x000500000001a4b5-1290.dat upx behavioral1/memory/2896-1292-0x000007FEF58B0000-0x000007FEF5E9E000-memory.dmp upx behavioral1/memory/2720-1307-0x0000000006860000-0x0000000006FF6000-memory.dmp upx behavioral1/memory/2720-1326-0x0000000006860000-0x0000000006CDE000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000500000001a478-1267.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 876 2956 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55dd833b1e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage ec11b045b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0tClIDb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec11b045b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83469d6ad3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kelyBT9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f79a21ef1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ec11b045b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language callmobile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1508 taskkill.exe 4264 taskkill.exe 4440 taskkill.exe 4656 taskkill.exe 3492 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2548 file.exe 2720 skotes.exe 4780 0tClIDb.exe 2956 callmobile.exe 3428 kelyBT9.exe 4072 55dd833b1e.exe 1940 0f79a21ef1.exe 3356 ec11b045b2.exe 1936 83469d6ad3.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 1936 83469d6ad3.exe 1936 83469d6ad3.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2956 callmobile.exe Token: SeDebugPrivilege 2956 callmobile.exe Token: SeDebugPrivilege 3428 kelyBT9.exe Token: SeDebugPrivilege 3492 taskkill.exe Token: SeDebugPrivilege 1508 taskkill.exe Token: SeDebugPrivilege 4264 taskkill.exe Token: SeDebugPrivilege 4440 taskkill.exe Token: SeDebugPrivilege 4656 taskkill.exe Token: SeDebugPrivilege 880 firefox.exe Token: SeDebugPrivilege 880 firefox.exe Token: SeDebugPrivilege 1936 83469d6ad3.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2548 file.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 880 firefox.exe 880 firefox.exe 880 firefox.exe 880 firefox.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 880 firefox.exe 880 firefox.exe 880 firefox.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe 3356 ec11b045b2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2720 2548 file.exe 30 PID 2548 wrote to memory of 2720 2548 file.exe 30 PID 2548 wrote to memory of 2720 2548 file.exe 30 PID 2548 wrote to memory of 2720 2548 file.exe 30 PID 2720 wrote to memory of 2940 2720 skotes.exe 33 PID 2720 wrote to memory of 2940 2720 skotes.exe 33 PID 2720 wrote to memory of 2940 2720 skotes.exe 33 PID 2720 wrote to memory of 2940 2720 skotes.exe 33 PID 2940 wrote to memory of 2956 2940 B3vKvPi.exe 34 PID 2940 wrote to memory of 2956 2940 B3vKvPi.exe 34 PID 2940 wrote to memory of 2956 2940 B3vKvPi.exe 34 PID 2940 wrote to memory of 2956 2940 B3vKvPi.exe 34 PID 2720 wrote to memory of 4780 2720 skotes.exe 35 PID 2720 wrote to memory of 4780 2720 skotes.exe 35 PID 2720 wrote to memory of 4780 2720 skotes.exe 35 PID 2720 wrote to memory of 4780 2720 skotes.exe 35 PID 2956 wrote to memory of 876 2956 callmobile.exe 37 PID 2956 wrote to memory of 876 2956 callmobile.exe 37 PID 2956 wrote to memory of 876 2956 callmobile.exe 37 PID 2956 wrote to memory of 876 2956 callmobile.exe 37 PID 2720 wrote to memory of 1600 2720 skotes.exe 38 PID 2720 wrote to memory of 1600 2720 skotes.exe 38 PID 2720 wrote to memory of 1600 2720 skotes.exe 38 PID 2720 wrote to memory of 1600 2720 skotes.exe 38 PID 1600 wrote to memory of 2896 1600 main.exe 39 PID 1600 wrote to memory of 2896 1600 main.exe 39 PID 1600 wrote to memory of 2896 1600 main.exe 39 PID 2720 wrote to memory of 3428 2720 skotes.exe 40 PID 2720 wrote to memory of 3428 2720 skotes.exe 40 PID 2720 wrote to memory of 3428 2720 skotes.exe 40 PID 2720 wrote to memory of 3428 2720 skotes.exe 40 PID 3428 wrote to memory of 3808 3428 kelyBT9.exe 41 PID 3428 wrote to memory of 3808 3428 kelyBT9.exe 41 PID 3428 wrote to memory of 3808 3428 kelyBT9.exe 41 PID 3428 wrote to memory of 3808 3428 kelyBT9.exe 41 PID 2720 wrote to memory of 4072 2720 skotes.exe 43 PID 2720 wrote to memory of 4072 2720 skotes.exe 43 PID 2720 wrote to memory of 4072 2720 skotes.exe 43 PID 2720 wrote to memory of 4072 2720 skotes.exe 43 PID 2720 wrote to memory of 1940 2720 skotes.exe 44 PID 2720 wrote to memory of 1940 2720 skotes.exe 44 PID 2720 wrote to memory of 1940 2720 skotes.exe 44 PID 2720 wrote to memory of 1940 2720 skotes.exe 44 PID 2720 wrote to memory of 3356 2720 skotes.exe 45 PID 2720 wrote to memory of 3356 2720 skotes.exe 45 PID 2720 wrote to memory of 3356 2720 skotes.exe 45 PID 2720 wrote to memory of 3356 2720 skotes.exe 45 PID 3356 wrote to memory of 3492 3356 ec11b045b2.exe 46 PID 3356 wrote to memory of 3492 3356 ec11b045b2.exe 46 PID 3356 wrote to memory of 3492 3356 ec11b045b2.exe 46 PID 3356 wrote to memory of 3492 3356 ec11b045b2.exe 46 PID 3356 wrote to memory of 1508 3356 ec11b045b2.exe 48 PID 3356 wrote to memory of 1508 3356 ec11b045b2.exe 48 PID 3356 wrote to memory of 1508 3356 ec11b045b2.exe 48 PID 3356 wrote to memory of 1508 3356 ec11b045b2.exe 48 PID 3356 wrote to memory of 4264 3356 ec11b045b2.exe 50 PID 3356 wrote to memory of 4264 3356 ec11b045b2.exe 50 PID 3356 wrote to memory of 4264 3356 ec11b045b2.exe 50 PID 3356 wrote to memory of 4264 3356 ec11b045b2.exe 50 PID 3356 wrote to memory of 4440 3356 ec11b045b2.exe 52 PID 3356 wrote to memory of 4440 3356 ec11b045b2.exe 52 PID 3356 wrote to memory of 4440 3356 ec11b045b2.exe 52 PID 3356 wrote to memory of 4440 3356 ec11b045b2.exe 52 PID 3356 wrote to memory of 4656 3356 ec11b045b2.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\callmobile.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\callmobile.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 6165⤵
- Loads dropped DLL
- Program crash
PID:876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe"C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SecurityHealthSystray.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\SecurityHealthSystray.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3808
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013272001\55dd833b1e.exe"C:\Users\Admin\AppData\Local\Temp\1013272001\55dd833b1e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\1013273001\0f79a21ef1.exe"C:\Users\Admin\AppData\Local\Temp\1013273001\0f79a21ef1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\1013274001\ec11b045b2.exe"C:\Users\Admin\AppData\Local\Temp\1013274001\ec11b045b2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1840
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:880 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="880.0.1233818674\492941040" -parentBuildID 20221007134813 -prefsHandle 1228 -prefMapHandle 1220 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {96147d10-6b12-449f-9c21-9827a6bf8a31} 880 "\\.\pipe\gecko-crash-server-pipe.880" 1304 127d6d58 gpu6⤵PID:264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="880.1.926985088\1659033280" -parentBuildID 20221007134813 -prefsHandle 1496 -prefMapHandle 1492 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {31380e64-d6b4-49c3-838e-44df0b0711d7} 880 "\\.\pipe\gecko-crash-server-pipe.880" 1508 e73058 socket6⤵PID:2184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="880.2.1488251638\1410468423" -childID 1 -isForBrowser -prefsHandle 2200 -prefMapHandle 2196 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d717592c-525b-4820-b074-8a2e7cce2797} 880 "\\.\pipe\gecko-crash-server-pipe.880" 2212 16e0c258 tab6⤵PID:3308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="880.3.985392403\85302542" -childID 2 -isForBrowser -prefsHandle 2768 -prefMapHandle 2764 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ebcd7d7-9851-41fa-9c94-95906ff2e9d1} 880 "\\.\pipe\gecko-crash-server-pipe.880" 2780 1cecc258 tab6⤵PID:3824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="880.4.2044001886\646582295" -childID 3 -isForBrowser -prefsHandle 1112 -prefMapHandle 1108 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {29fbd2fd-e971-4363-ab78-a4f88c7334b4} 880 "\\.\pipe\gecko-crash-server-pipe.880" 3704 1ef98558 tab6⤵PID:4960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="880.5.713551918\453398507" -childID 4 -isForBrowser -prefsHandle 3824 -prefMapHandle 3828 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb8f6c2c-d3c8-4697-8026-c0b681e37a91} 880 "\\.\pipe\gecko-crash-server-pipe.880" 3812 1ef98b58 tab6⤵PID:4832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="880.6.728954863\1637897107" -childID 5 -isForBrowser -prefsHandle 3716 -prefMapHandle 3968 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b3c2b15-62c7-49bb-ae77-4598d0645e76} 880 "\\.\pipe\gecko-crash-server-pipe.880" 4008 1eb2e958 tab6⤵PID:4840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013275001\83469d6ad3.exe"C:\Users\Admin\AppData\Local\Temp\1013275001\83469d6ad3.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5fb059807ca135ee17461a52181732ffb
SHA1729b23543411e04b4262d9488ef356738082c490
SHA256fda0f43bd078391d85829888ffcd022e6867a968fda6402f4d9ae39a5de08025
SHA5128a35e92c40634606ae70cc9d792ab0fcda9c66d5355156d4b7416b33134cb3bcbf3b59a4135a3633bb5d934e984653bc34bbd954eb4d7af087661b85e0f9089c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.2MB
MD53541c1ac26eb5bbb87f01c20fd9f8824
SHA1bf5d136c911491f59bdeb3bf37b8f1a155fd3a97
SHA256b7cd929ce4d0fa849eeab8a216e1333f63c7d3530da674f163efab4dae3439d1
SHA512babc17723d2389919acd96f977821d57bdd737f01a9598209efafa72ae0418e914a5d229f196d80cb5ba70ce82b0f340b18aa255bbe4ed77d821a432d5794a93
-
Filesize
1.8MB
MD56367fb8a64f997be8d65536534bdd057
SHA13ee062142dde2330881566a63a92957037a0e6b3
SHA256bdae46a5cb1f1b6b9864b5e944ed5b2e24622d7385a196e0293f7b9da59bda5e
SHA512ace2dbba313180a64f70f49c7763fb9da23ef76b82548c8fa54a7d1e8d4810cad83726fe532459660e12e4f6a9210df09dd836ea28f1cc5a791a4873b95a274c
-
Filesize
28.8MB
MD5edfd96e5650f8bdcc1a8e090ee5e1069
SHA12692b46e817a81f3f94dbee53f508e2e875a075f
SHA2569af13f157af0575a379bef789f8c596584e2721de3ba607c88a9601140e28cd8
SHA5124eaafa523b41d5ba3745fcbef8b0598aa0c0fdffae1f618e92f8c702d0288e8bdacc3fd28cc2ecaf8e888a09c15e06e3f6beb4f1152673670e20b0e240b85e2b
-
Filesize
3.0MB
MD525ae2a8e59da886dbc3192b12e000ffa
SHA1c384fbee5a29be18571d293c1e20a36d044bd86a
SHA256d951b4352f6e4f9ef63cbbabac6cae41d3de37d26dee4b4890d60b52d51ddbb4
SHA512246a2948f880231fe597a4c6cfb1f8acbbc7173f73752532dd2049697cd4165c6d1e966a1a598d260053e1f4aeebf0472ffedc4aec56c8233899c965c7fc6736
-
Filesize
1.7MB
MD5ea75f3fab08469ff2b1d678391c1a22d
SHA1204cbd9a03eee8c43bfa3f9a78d894a23e74f040
SHA256be55e2fd64703554eeed811ec1d38d4033abf2c8bc63f5b8e1a83423ac3bfab2
SHA512d0bbb7893fcebae2228373b226104f842c3704a7c472b10c832577649049bd95c45849034c5f2feae7db0b7aef4fce5e4db3603435c81b59aa13fbf910c45a1c
-
Filesize
1.7MB
MD593cf0c1d0e86682494a39b17018c52da
SHA1e355d639712fe8544b809ace456fe376ad981700
SHA256eb0dc4bb0c42e1460a69fb51db5c2eafc7bf4a16a9b801ab167adbad57119713
SHA5122f0b9c80f9c0f4ef895d6d244cf6bd8a580678b769c286965e57ac9a5ca93f855862bb1614c30da719d8d5f1457b4f3502735e85df84079c023553d1b315544c
-
Filesize
946KB
MD5204672403e8bc77bd89fdf4d71d42f67
SHA16f172789c2cf675c02c581bd7cce16c77965680f
SHA25646c031327b7af6f714802357d0f6b295cfd30082e50632be8b0152628401628d
SHA512ef78ee170491db43fe8f579f7d797f14fc03e9ba85743934fcba1c5ee0f02d88bd8e164323bc37adf18b55cb3600d8c9670e328144048a6210db39bbbbf5f6a7
-
Filesize
2.7MB
MD579e083dd3ef04c0e15324b8c914d1555
SHA14f2a3e718310d6901be3fe717012d18edf682349
SHA256accecbc48ac0b8817c7115e9db5c34b61bef17333c5b497b376365be416d19a4
SHA512ca164e703d109d2f9808b4b9ef07d571875f402fda4e6f76ddc8b46d7f4882b0aa139787ccf094938bc78ed41853cd9d486451d3f1f9581ce7ef7384a2be743a
-
Filesize
2.3MB
MD5ffabcc262fb699998b6191d7656c8805
SHA1fd3ea79a8550b14e9cc75fb831fd7a141964a714
SHA256f46e4a7de978baceec5f64cbc9fa1f1e772e864fa3310045cd19d77264698cde
SHA51279b2e21a9111b16b0f67ae5d1cc40a25773b847d3f4cf78711a8dfd8b67c30beec332ed65ac008c9dca62c84de891eff20d7c6050bc868bce77a17fe56da61ba
-
Filesize
1.6MB
MD576eb1ad615ba6600ce747bf1acde6679
SHA1d3e1318077217372653be3947635b93df68156a4
SHA25630be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1
SHA5122b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5b24ada58871dcb64dc71551b49267c9d
SHA1ba20620d71b4a36e6dc4969e515f17dafd37f5c3
SHA25619ba44cbe97ac0c23f2bcd2f9765bfa3022b42ed4e5d463746bab151e8764d3d
SHA512890639b4a528a6d71881110d8cdfd5aacd96b14da762da6812eb544148e18166c3bfb669022fa21d591832eaba65a2da26f319b62b2dabd68bd4204a3abfebf3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\32664601-d944-43f1-ae0f-6fbb06c43b24
Filesize11KB
MD5a39ebbabd2d45b35ce0730ab24267f4e
SHA13eac6d20095d27f49e52e850ae82703eda83c138
SHA256f7c6d7981020ad2d21fb215cd0fab36ba0342940a8315e2974cbc80abec43e3d
SHA5121479a8f4fa28482af6f6feeea94ff296d6d36bbb7b1c67dd005db7daa91cb5901c6d9c7bed1d45afe27d7de77bbe42e99449722db7ecfd709bcb8e6839c24d46
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\8531455b-7d16-40f8-8828-195e97b8be2e
Filesize745B
MD5eba1212bad0b1e9aba443ec3471f8d78
SHA1294a09fb411a970b603a41d7c2d6eeea03b1e368
SHA256759fc1dfd1d36c6be16e2dea3cedb7549671e70f949ef33a2f17de940abda01f
SHA5129d383e0d2b350e7c788f14064b4959475981d1d32b7077971411cb598101eeed3a114f35f282f77934a5c67e0c60a6b772b0218fc7efdb5d25130591de7e408e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD577b98c10a18e295a60bb21647751b7ef
SHA14dc458a91c1234eab6203598e3c752ff48971968
SHA256de8163c7541b5a6df0d627bc758b142970ccf01a95378dd33d6a5c5d154fa47e
SHA5128a8e360addf5699e3d552eb1fae2c69ab80ae8d1eb6b8aa93d0fb869b1eca4db793452216c468abe30ca23c32c91f29585a3e267d6f0acc1d70e432ab6e82f53
-
Filesize
7KB
MD5fc273e43b91e878784bb464226738848
SHA1622c20b7881f21cc488ef109e68b81a7a0fecdba
SHA2564f9340a09bc98d44d5c046255d785ffa9e54a52fcdc02c40f03280f2997c6fb7
SHA512e734d4bc3fb4e14cc7ed144099cf81303534788ca1e91e80e352b42559d236f43db52808d06f13485ec65e421f16e9c5aa3ceb3af73da2b6cf2d09b882c4aee1
-
Filesize
6KB
MD5b633059e747e6e92b28a81c0da387361
SHA1cf3076d31b9d672c36672a29e5d91e11a1b35f2c
SHA256cd627da1ea3d5e43fb6dabd74767e2d2016b100523295a2bda2a707c4af95e9e
SHA512556e11adeb1f8c7b17932843db6b488a022cc2aaa4535c283e13b83b86bee1372940d3d5733b1d44dda2a85d590b72a91c03215e18b090ea7e3c8ceebe15e6d3
-
Filesize
6KB
MD5b3550a4699e94387d3873bcb5ac6b555
SHA1b7fd67b54648a1772101583118cc3602a90a7a1d
SHA2568ad542a68eb0a1c8c90b8274125f35145f397cca0e98ba2e893fc67be092bbb5
SHA512e23feef9c7a29d8aad3bb7bcc701143b3373827490b24a7d22f42fbf544374a8fd44909d1e878ba5edd139a91bb33e45e980acd978fae92f7a0144dd3b4fddb2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD54a4c095d1603c43f5def1773c5ef95cf
SHA13d4a5f4fa7110378dfe03a1eb0a31c81c66b6aac
SHA256b7f56d10b3d7c4b5d60ddb746ffce7c49ace4fa9e70f495ca82ca39eafe4c698
SHA512563fb9d607ce9f494ac99df1df381bc2367e218e0b997c3ac486e4374f39dbe0d350dae9bd67627f312818302df346e4944df5d2c79c311860534cd0a909fa17
-
Filesize
3.2MB
MD58310dd77fc508989327b7242d9f00757
SHA10f47666d19e93f838bf9e2d67a1a0c42dd2561f2
SHA256306e3f1775f8481fe89d3575b57d8bcab355e9d55d1b66cbf7b246f8bd2a3dd0
SHA512279770c1ae7698765dca0a7d4cffb6695381f8513ac12283c6e77b80cfd198d2a16c1ed12854f17ca8f91089632bbae65278bf8d157ec01fc3538cdc4416e697