Analysis
-
max time kernel
74s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe
Resource
win7-20240708-en
General
-
Target
ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe
-
Size
3.1MB
-
MD5
b2b571311ce73fae9f03f3c10e894ca7
-
SHA1
6083d27101e3e323c8e25e4dd34ba1e13571bf33
-
SHA256
ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6
-
SHA512
cdf4c6ab60e185cd783f7b5ddedf4d4b8cd6d072c0a07c860b6beff9248a6173d6e5bafd34dc487ffc15fd2f14f1e105d1c8a7fc3bba39b79994b7ffbb143a1d
-
SSDEEP
49152:0FurO4HoMBIKDE+nAepay2Rytdid0Xn7OXyJLn+:+PooMqgvnhOSrOiJLn+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 22e5ab3327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 22e5ab3327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 22e5ab3327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 22e5ab3327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 22e5ab3327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 22e5ab3327.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 48fa0ab4bd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c4307adc9f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 22e5ab3327.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2104 powershell.exe 3344 powershell.exe 3708 powershell.exe 4040 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts IDEK.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\GoogleUpdateTaskMachineQC\ImagePath = "C:\\ProgramData\\Google\\Chrome\\updater.exe" services.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 48fa0ab4bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c4307adc9f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 22e5ab3327.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 48fa0ab4bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c4307adc9f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 22e5ab3327.exe -
Executes dropped EXE 7 IoCs
pid Process 2576 skotes.exe 2172 DLER214.exe 1880 48fa0ab4bd.exe 1140 c4307adc9f.exe 2116 303139718c.exe 1240 22e5ab3327.exe 1940 IDEK.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 48fa0ab4bd.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine c4307adc9f.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 22e5ab3327.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe -
Loads dropped DLL 15 IoCs
pid Process 2432 ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe 2576 skotes.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 2576 skotes.exe 2576 skotes.exe 2576 skotes.exe 2576 skotes.exe 2576 skotes.exe 2576 skotes.exe 2576 skotes.exe 2576 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 22e5ab3327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 22e5ab3327.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\48fa0ab4bd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004066001\\48fa0ab4bd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\c4307adc9f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004067001\\c4307adc9f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\303139718c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004068001\\303139718c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\22e5ab3327.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004069001\\22e5ab3327.exe" skotes.exe -
Power Settings 1 TTPs 12 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2232 powercfg.exe 2424 powercfg.exe 3844 powercfg.exe 3824 powercfg.exe 3804 powercfg.exe 3836 powercfg.exe 2520 powercfg.exe 2116 powercfg.exe 3808 powercfg.exe 4056 powercfg.exe 908 powercfg.exe 2104 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000191df-94.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe IDEK.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2432 ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe 2576 skotes.exe 1880 48fa0ab4bd.exe 1140 c4307adc9f.exe 1240 22e5ab3327.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 2904 1940 IDEK.exe 82 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 19 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2904 sc.exe 3236 sc.exe 2040 sc.exe 2464 sc.exe 2288 sc.exe 3640 sc.exe 3224 sc.exe 2360 sc.exe 3588 sc.exe 3632 sc.exe 3392 sc.exe 2360 sc.exe 536 sc.exe 1724 sc.exe 3360 sc.exe 2240 sc.exe 3728 sc.exe 3776 sc.exe 3700 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1520 2172 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 303139718c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22e5ab3327.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DLER214.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48fa0ab4bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4307adc9f.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2244 taskkill.exe 2908 taskkill.exe 2200 taskkill.exe 1944 taskkill.exe 1712 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2432 ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe 2576 skotes.exe 1880 48fa0ab4bd.exe 1140 c4307adc9f.exe 2116 303139718c.exe 2116 303139718c.exe 1240 22e5ab3327.exe 1240 22e5ab3327.exe 1240 22e5ab3327.exe 1940 IDEK.exe 2104 powershell.exe 1940 IDEK.exe 1940 IDEK.exe 1940 IDEK.exe 1940 IDEK.exe 1940 IDEK.exe 1940 IDEK.exe 1940 IDEK.exe 1940 IDEK.exe 1940 IDEK.exe 1940 IDEK.exe 1940 IDEK.exe 1940 IDEK.exe 2904 dialer.exe 2904 dialer.exe 2904 dialer.exe 2904 dialer.exe 2904 dialer.exe 2904 dialer.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 2904 dialer.exe 2904 dialer.exe 2904 dialer.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 1940 IDEK.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 2904 dialer.exe 2904 dialer.exe 2904 dialer.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 848 svchost.exe 1940 IDEK.exe 1940 IDEK.exe 848 svchost.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2172 DLER214.exe Token: SeDebugPrivilege 2244 taskkill.exe Token: SeDebugPrivilege 2908 taskkill.exe Token: SeDebugPrivilege 2200 taskkill.exe Token: SeDebugPrivilege 1944 taskkill.exe Token: SeDebugPrivilege 1712 taskkill.exe Token: SeDebugPrivilege 2728 firefox.exe Token: SeDebugPrivilege 2728 firefox.exe Token: SeDebugPrivilege 1240 22e5ab3327.exe Token: SeDebugPrivilege 2104 powershell.exe Token: SeDebugPrivilege 2904 dialer.exe Token: SeShutdownPrivilege 2520 powercfg.exe Token: SeShutdownPrivilege 2116 powercfg.exe Token: SeShutdownPrivilege 2232 powercfg.exe Token: SeShutdownPrivilege 2424 powercfg.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2432 ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe 2116 303139718c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2576 2432 ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe 30 PID 2432 wrote to memory of 2576 2432 ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe 30 PID 2432 wrote to memory of 2576 2432 ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe 30 PID 2432 wrote to memory of 2576 2432 ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe 30 PID 2576 wrote to memory of 2172 2576 skotes.exe 31 PID 2576 wrote to memory of 2172 2576 skotes.exe 31 PID 2576 wrote to memory of 2172 2576 skotes.exe 31 PID 2576 wrote to memory of 2172 2576 skotes.exe 31 PID 2172 wrote to memory of 1520 2172 DLER214.exe 33 PID 2172 wrote to memory of 1520 2172 DLER214.exe 33 PID 2172 wrote to memory of 1520 2172 DLER214.exe 33 PID 2172 wrote to memory of 1520 2172 DLER214.exe 33 PID 2576 wrote to memory of 1880 2576 skotes.exe 34 PID 2576 wrote to memory of 1880 2576 skotes.exe 34 PID 2576 wrote to memory of 1880 2576 skotes.exe 34 PID 2576 wrote to memory of 1880 2576 skotes.exe 34 PID 2576 wrote to memory of 1140 2576 skotes.exe 36 PID 2576 wrote to memory of 1140 2576 skotes.exe 36 PID 2576 wrote to memory of 1140 2576 skotes.exe 36 PID 2576 wrote to memory of 1140 2576 skotes.exe 36 PID 2576 wrote to memory of 2116 2576 skotes.exe 37 PID 2576 wrote to memory of 2116 2576 skotes.exe 37 PID 2576 wrote to memory of 2116 2576 skotes.exe 37 PID 2576 wrote to memory of 2116 2576 skotes.exe 37 PID 2116 wrote to memory of 2244 2116 303139718c.exe 38 PID 2116 wrote to memory of 2244 2116 303139718c.exe 38 PID 2116 wrote to memory of 2244 2116 303139718c.exe 38 PID 2116 wrote to memory of 2244 2116 303139718c.exe 38 PID 2116 wrote to memory of 2908 2116 303139718c.exe 40 PID 2116 wrote to memory of 2908 2116 303139718c.exe 40 PID 2116 wrote to memory of 2908 2116 303139718c.exe 40 PID 2116 wrote to memory of 2908 2116 303139718c.exe 40 PID 2116 wrote to memory of 2200 2116 303139718c.exe 42 PID 2116 wrote to memory of 2200 2116 303139718c.exe 42 PID 2116 wrote to memory of 2200 2116 303139718c.exe 42 PID 2116 wrote to memory of 2200 2116 303139718c.exe 42 PID 2116 wrote to memory of 1944 2116 303139718c.exe 44 PID 2116 wrote to memory of 1944 2116 303139718c.exe 44 PID 2116 wrote to memory of 1944 2116 303139718c.exe 44 PID 2116 wrote to memory of 1944 2116 303139718c.exe 44 PID 2116 wrote to memory of 1712 2116 303139718c.exe 46 PID 2116 wrote to memory of 1712 2116 303139718c.exe 46 PID 2116 wrote to memory of 1712 2116 303139718c.exe 46 PID 2116 wrote to memory of 1712 2116 303139718c.exe 46 PID 2116 wrote to memory of 2824 2116 303139718c.exe 48 PID 2116 wrote to memory of 2824 2116 303139718c.exe 48 PID 2116 wrote to memory of 2824 2116 303139718c.exe 48 PID 2116 wrote to memory of 2824 2116 303139718c.exe 48 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2824 wrote to memory of 2728 2824 firefox.exe 49 PID 2728 wrote to memory of 2432 2728 firefox.exe 50 PID 2728 wrote to memory of 2432 2728 firefox.exe 50 PID 2728 wrote to memory of 2432 2728 firefox.exe 50 PID 2728 wrote to memory of 1556 2728 firefox.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Sets service image path in registry
PID:480 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:596
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1244
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:1488
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding3⤵PID:1296
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:676
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:752
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:820
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1168
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:972
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:284
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:348
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1072
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:1092
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2892
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2088
-
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe2⤵PID:3264
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:3344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵PID:3576
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:3628
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:3588
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3640
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:3700
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:3728
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:3776
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
PID:3804
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
PID:3808
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
PID:3824
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
PID:3844
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵PID:3908
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵PID:2420
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:3708
-
-
C:\ProgramData\Google\Chrome\updater.exe"C:\ProgramData\Google\Chrome\updater.exe"4⤵PID:3748
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
PID:4040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:3180
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:1932
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:3632
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:2360
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:3392
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:3236
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:3224
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
PID:2104
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
PID:908
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
PID:3836
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
PID:4056
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵PID:3280
-
-
C:\Windows\system32\dialer.exedialer.exe5⤵PID:3596
-
-
-
-
C:\Windows\system32\dialer.exedialer.exe3⤵PID:4012
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:488
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:496
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe"C:\Users\Admin\AppData\Local\Temp\ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe"C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 10765⤵
- Loads dropped DLL
- Program crash
PID:1520
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004066001\48fa0ab4bd.exe"C:\Users\Admin\AppData\Local\Temp\1004066001\48fa0ab4bd.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\1004067001\c4307adc9f.exe"C:\Users\Admin\AppData\Local\Temp\1004067001\c4307adc9f.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\1004068001\303139718c.exe"C:\Users\Admin\AppData\Local\Temp\1004068001\303139718c.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.0.1806544885\1931213873" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {38f7b4d1-5b12-42ff-84dd-8916b0d121f7} 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 1280 112d7e58 gpu7⤵PID:2432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.1.1824718330\355628705" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e730873-4f95-457b-a532-42a42fd80562} 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 1496 e74258 socket7⤵PID:1556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.2.325026125\1735163912" -childID 1 -isForBrowser -prefsHandle 2088 -prefMapHandle 2084 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae49892c-8c42-4b5a-b253-1bef99f33454} 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 2100 1a296358 tab7⤵PID:1044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.3.506017690\126761659" -childID 2 -isForBrowser -prefsHandle 2896 -prefMapHandle 2892 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {836f71f3-dfee-4fb3-917f-5b222d483399} 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 2908 1d3d9658 tab7⤵PID:1828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.4.252885092\440843252" -childID 3 -isForBrowser -prefsHandle 3720 -prefMapHandle 3808 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {29cf8800-467f-4496-974c-51c5b9768871} 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 3820 202fb858 tab7⤵PID:1088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.5.938538595\2135173875" -childID 4 -isForBrowser -prefsHandle 3928 -prefMapHandle 3932 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {32a5dee7-87d2-4edb-a41e-6de22725b171} 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 3916 202fa358 tab7⤵PID:2964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.6.1606130148\324010270" -childID 5 -isForBrowser -prefsHandle 3996 -prefMapHandle 3940 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d05e361-62eb-44dd-8c0d-8339d342c5f9} 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 3984 202fa658 tab7⤵PID:1968
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004069001\22e5ab3327.exe"C:\Users\Admin\AppData\Local\Temp\1004069001\22e5ab3327.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\1004070001\IDEK.exe"C:\Users\Admin\AppData\Local\Temp\1004070001\IDEK.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:2356
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵
- Drops file in Windows directory
PID:2108
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:2904
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:2040
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:2360
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:536
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:1724
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"5⤵
- Launches sc.exe
PID:2464
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"5⤵
- Launches sc.exe
PID:3360
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:2288
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"5⤵
- Launches sc.exe
PID:2240
-
-
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "7950645011799387912-1746644307203842189917111947791135731266-1067276836-495584432"1⤵PID:908
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "164487150715696552061306892373114385555495788033516349158771732891448593064859"1⤵PID:540
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "15612162272140919752-1185178057206806709127353233297088164614826395311710448112"1⤵PID:2344
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1182724255-17552632254615984409047585524591222457476793369390772842091221956"1⤵PID:2824
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1707771748-2124086545-21028837732097430248810348451893779841-2018107433932543542"1⤵PID:1932
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "410951321-97278428-410010812-114741359721231025681995632062-610083996-268430424"1⤵PID:3480
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
4Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5ed9278815e36efa2f6ebf0309090be42
SHA1f468c2de2b0e49133d6630e5e6f9892fe3b949a4
SHA256f4fa0439cf79dfc7168dbd7e9d9d533c51f7e0acf528236f01fc6bf8dd516940
SHA51274f5fa94553c7ce05d395477e11314c2bc65ab3a9a1f7a90caff60107319f5bd8203c834abd07fde418314437abb1df522abf2cf3f876b4d511230248f4194da
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
16KB
MD554ec587044fdff4bfd0029946041a109
SHA1242cc5fdd5c75a02776f1f5e526cc42cf138b313
SHA256e666b2644c35f564041ad18c5125f1677255f05421ad18785aed42bfb3ac5adf
SHA5126e2c9f3b3850c021b0db78af02f37e6fe1b32bd046ba5767b0499f2c4af11586e167c80235258b5536bcfece567a18f2e2eca6a107e60d5efb62a65175049046
-
Filesize
2.9MB
MD516f1c8aa951e83b4ea794bf5b66291e6
SHA19a7310bc9b25759b2a3b98c199dc7eb56605516f
SHA256a2ffee36f80aa7450c094f3d0340e9eda3ae58613b1f7ac19e57d0b91b8d3acd
SHA512e763e14d2ad8e95755ea4834ed6dc9a081091edebcbec6472636ad44cf0d0a002ec07f696835045069435730b5a29ba4b64c1f04b9c5f1721e8f8abff208a077
-
Filesize
2.0MB
MD5942d8839790190a0b7269d587425c3ef
SHA1b61fb82d04980dc1453247536a95bb0f721eb59f
SHA256df99583b876c169028a4e9817489d6c3fe65c391903a9bf2db295cbabc4cdf63
SHA5121b8cb308198b9270637fc4d1cd65bcd4b685e93365b031af089730a67bc8e21d4bba143ef005c7f0294256b0bfec6ba0f8322f125cba5e5d65950cdc0336efa7
-
Filesize
898KB
MD52edd0a55ddabfe03d1e524227e6865c5
SHA1e3d6f4b661ebdc79054b4afb0c54a1392ad4c34e
SHA256e0d64d8bfb6bcf0e1b9ee2989b919e7b6767288153338ed999cefb3b41cf07e4
SHA51267f7c53aacfc8c5aa5e4d9bf84d5b0064b84d9e4ae66cd4e8d99adf559c1fd6103878c36679db836c4b358e967332ff2859b22f04fb5684c39ccffe5d36eed85
-
Filesize
2.7MB
MD5d98eca55b5386fba824026cadb1b94de
SHA12bfdf079f15f36db98d8524f090b49f6cca7b04f
SHA256441147d44772362fe1d8efc3f8f36bbb55dcd165d50227b05320c5e5557d220c
SHA51241299a884769a7df578b4ff04a59a56ae63717b504b558799d4fd728a0363e15e352a9351c9497b22e0626ba44cf44d18307a682d82526287c9ccbc747bb50d7
-
Filesize
5.3MB
MD573a56908097ee57dd4217877aeae4641
SHA1a41cc3570f40f9688b2ac9f5e7326150a3a350a6
SHA256fde56e00761a85ad495bd2d05654f3657922f665f58edfabcf43d2fa769f0d79
SHA512930ba7d57f250b5c9e020c0265db9376d0675bfcafb7c5c5e292add319ec2942a9f2b5286f997e406e7f1effb8e1029649a5141cd7ad032f4b75a77e51259c67
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD58d470c8197a72232cda4d586dcefb01f
SHA1f44183f949243e81446d908a028763e99a95cc70
SHA256a31075d98945f62d7ad98ca7b41a0be6dcfa9c9ee49906a91e97b97d26818caf
SHA512beedeaae355330689fada9bdc233eeea04dcf07574506258d9b728190b9cbac24d974be63abb45a89529f2a3e76aef521ed6761765437114dc13b4bd608c3473
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\bb5aac43-8851-476e-ac8c-4e15f5d3e754
Filesize745B
MD589d0da1517e777258a90b814ba19c180
SHA1a0f594d06f18641a7cd7a840f88dfef18a00f9d9
SHA256ecc8f9514d7757aa182448af59f326d08568f0aebe8db6c1f0b80c31c7c1154b
SHA512c9691e45442efb04aff4ecfb72821f473bc64107ee10cc8a07da3eab3bf78c29ae4dc45bf0569803721d466e42152b4460cfb3937ebd62ffb0a8c8b791cf362a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\f410f39d-08d6-4d69-a2b5-2817d2e221eb
Filesize11KB
MD55a65ca5c679f858bd9a0a2e0c7a31559
SHA1af9812848e1792afe96bffbaf9dd1e61929c8d31
SHA256909cfca9981bc49c8b543e60103a44c74fafa4b30d130d3082b22bd921f370bd
SHA512ab3d05156a94537e0a8f4e4cce5bf445d080f6d6587b5c70298ba1dcd9e146382e90a1c3a5a3caba8e00df4838d17134508f59aba763709569e557054d00d71d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD50a321c47976b285b03aff9fd98b90407
SHA11bb4b5c7027906d927907dc417c89f0f082e8ca6
SHA25680a6cea15b4cb8846555f6b89e728bb35338d6a1244775aa64559dfac69d2b94
SHA5120d38df06b2ab0d2f94bc3f5bdb18d7b9239a4dff47dcdac08358bb007ef98a15ea75076227c707e3c68ce9e18c2b1b0f8109cced76f80e92a5747ae25ed45e39
-
Filesize
7KB
MD59a7331827362b555df3d0a8ca439bf78
SHA1bb8d8a53bbe6a8a97985f03a8984e869922e8b87
SHA2567ae0d78bbea7941accd2af9c10006fb49563efffe0c36dcff72620e79c056118
SHA512b262121c413b599789baf1763bb2f430cb3a8a247d7a42df2496252f6d0f0fe5a215701a023b7b9d52510ae4627d4ac6f0e901e6ed7638cda883fd41c91a428d
-
Filesize
6KB
MD514b7b4ba3516f32bdac430d5cfef5b15
SHA1e113127e6c85241dce046f67c9b3715b65220dd8
SHA256164a31f59635e787a8ce9cbe7b8cc798dcd276fdb6ea9af831772c030cd74146
SHA512bcdad7e72dd3790381716ab3a879fa84cd17fc5f08d287204abbcffaee5c547e6995be29faf712e2ad78556b82694418595f400d2f6c28458d2227c4ecca1582
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d1473ef9e1e085a0b147c49512dc708a
SHA193221fec6aa779d72daaa88dca3b86d732c52be1
SHA2565b1a5e7097bee8c43b6a5b2535204256f780cfd7fefdaccf4fc1de7d714a01fc
SHA51263e0684b1b8a455ff4b299cd8ec0325f062b7efa0a919d6752c09370d017cc90abe35e597e786178ecb67a697d6e7344e0968033c636db84f6aed54a00ecc0fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD53dc733f51b6c47c0e57ae7035b9abacf
SHA1d4c28a6f9d4bae9e297440a46726a2cb3e2504ba
SHA256aafa700fb884f14becaf86a0eb9df79dfa15885b2ebe11cabe5f48a3a5d9e0e1
SHA512e02670f6fa626a21ad150e0e0e589ba9f1f7a1fb921dc28f4117dc0a30a337b9c9b165dd0a30da864fe4dbdf130372e846648792a0bcf5aad4e8d28118101067
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
3.1MB
MD5b2b571311ce73fae9f03f3c10e894ca7
SHA16083d27101e3e323c8e25e4dd34ba1e13571bf33
SHA256ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6
SHA512cdf4c6ab60e185cd783f7b5ddedf4d4b8cd6d072c0a07c860b6beff9248a6173d6e5bafd34dc487ffc15fd2f14f1e105d1c8a7fc3bba39b79994b7ffbb143a1d