Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18/08/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
rama.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
rama.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
rama.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
rama.exe
Resource
win11-20240802-en
General
-
Target
rama.exe
-
Size
1.8MB
-
MD5
6e5042ff1ec6df9aee18f4eea7864524
-
SHA1
19e4eaaec31c8512b191138a439b6c4c7ba73d18
-
SHA256
420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c
-
SHA512
ac5c8537bfd0a509ab49911cdf180778e9e47f9f9fb600933b2ba03f939f9bc9834db5a106840382ee648b289cddaf69b55cf969f51b9f89c49c678f1edc202c
-
SSDEEP
49152:2M3rvEOaXgE3YC8ZtDYYuyVcBUpxOePEEmeweNX9:24E9QiYC2DYscuEEmdu
Malware Config
Extracted
amadey
4.41
c7817d
http://31.41.244.10
-
install_dir
0e8d0864aa
-
install_file
svoutse.exe
-
strings_key
5481b88a6ef75bcf21333988a4e47048
-
url_paths
/Dem7kTu/index.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rama.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rama.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rama.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe -
Executes dropped EXE 4 IoCs
pid Process 824 svoutse.exe 5004 e737ceb6fd.exe 2768 svoutse.exe 5272 svoutse.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Wine rama.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\e737ceb6fd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000008001\\e737ceb6fd.exe" svoutse.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4920 rama.exe 824 svoutse.exe 2768 svoutse.exe 5272 svoutse.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svoutse.job rama.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rama.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svoutse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e737ceb6fd.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4920 rama.exe 4920 rama.exe 824 svoutse.exe 824 svoutse.exe 3092 chrome.exe 3092 chrome.exe 2768 svoutse.exe 2768 svoutse.exe 5272 svoutse.exe 5272 svoutse.exe 2260 chrome.exe 2260 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeDebugPrivilege 1964 firefox.exe Token: SeDebugPrivilege 1964 firefox.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 1964 firefox.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 1964 firefox.exe 1964 firefox.exe 1964 firefox.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 1964 firefox.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 1964 firefox.exe 1964 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 824 4920 rama.exe 74 PID 4920 wrote to memory of 824 4920 rama.exe 74 PID 4920 wrote to memory of 824 4920 rama.exe 74 PID 824 wrote to memory of 5004 824 svoutse.exe 75 PID 824 wrote to memory of 5004 824 svoutse.exe 75 PID 824 wrote to memory of 5004 824 svoutse.exe 75 PID 5004 wrote to memory of 700 5004 e737ceb6fd.exe 76 PID 5004 wrote to memory of 700 5004 e737ceb6fd.exe 76 PID 700 wrote to memory of 3092 700 cmd.exe 79 PID 700 wrote to memory of 3092 700 cmd.exe 79 PID 700 wrote to memory of 2668 700 cmd.exe 80 PID 700 wrote to memory of 2668 700 cmd.exe 80 PID 3092 wrote to memory of 2428 3092 chrome.exe 81 PID 3092 wrote to memory of 2428 3092 chrome.exe 81 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 2668 wrote to memory of 1964 2668 firefox.exe 82 PID 1964 wrote to memory of 2116 1964 firefox.exe 83 PID 1964 wrote to memory of 2116 1964 firefox.exe 83 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 PID 3092 wrote to memory of 4888 3092 chrome.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\rama.exe"C:\Users\Admin\AppData\Local\Temp\rama.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\1000008001\e737ceb6fd.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\e737ceb6fd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\88A8.tmp\88A9.tmp\88AA.bat C:\Users\Admin\AppData\Local\Temp\1000008001\e737ceb6fd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd8,0xdc,0xe0,0xb4,0xe4,0x7ffa97e39758,0x7ffa97e39768,0x7ffa97e397786⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:26⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:86⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:86⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:16⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:16⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3740 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:16⤵PID:5860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4540 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:86⤵PID:6088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:86⤵PID:6096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:26⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"5⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.0.478225866\1831676892" -parentBuildID 20221007134813 -prefsHandle 1696 -prefMapHandle 1468 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a5bf694-8769-4307-9591-48e60d658196} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 1776 18fff1d2758 gpu7⤵PID:2116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.1.478242823\974961008" -parentBuildID 20221007134813 -prefsHandle 2116 -prefMapHandle 2112 -prefsLen 21608 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0bc61418-0250-40ee-b083-bf18d9846c1e} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 2152 18fff105f58 socket7⤵PID:1780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.2.1424877838\449644872" -childID 1 -isForBrowser -prefsHandle 2984 -prefMapHandle 2980 -prefsLen 21646 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d14b9ab6-4a9a-4986-b5a3-b0f58ee98eaa} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 2996 18f85dddf58 tab7⤵PID:4448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.3.1103291512\186717952" -childID 2 -isForBrowser -prefsHandle 3428 -prefMapHandle 3424 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bc62a7f-b5b0-48d5-8b4c-f20b6e861ada} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 3440 18f86ccc758 tab7⤵PID:3124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.4.1960885520\2037834240" -childID 3 -isForBrowser -prefsHandle 4876 -prefMapHandle 4864 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ed100ef-3906-4539-889a-1dfe7b765295} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 4888 18f88acd858 tab7⤵PID:5396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.5.1168708190\2076733528" -childID 4 -isForBrowser -prefsHandle 5048 -prefMapHandle 5052 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {779b7542-663e-4ac0-8acc-34bac236b349} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 5040 18f88acc358 tab7⤵PID:5404
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.6.31744013\343241851" -childID 5 -isForBrowser -prefsHandle 5232 -prefMapHandle 5236 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b172a555-76c5-413a-b866-c3d83440ac2d} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 5220 18f88acde58 tab7⤵PID:5412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.7.1186868383\171008461" -childID 6 -isForBrowser -prefsHandle 5220 -prefMapHandle 5408 -prefsLen 26424 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {95595e0f-3be3-4994-995a-d3502babd657} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 4868 18f89b56258 tab7⤵PID:5992
-
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5272
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD50263204b714aa7a5ccc44c82455040b7
SHA1580cba5e0a8b615f555b5b1ee3ff6998bd71b643
SHA256f578cf12d8110a6e5027024fc63a1cccdd665343b8ceb62ae0148b878dbb23eb
SHA51239f365bbc11c658e9ad3a989589533f55ca92a1d4ff8e684403b5d24363d18e4176d62f43e87c456609bc8759e74b92dc85fe15432bb6961ce7fd9a432966102
-
Filesize
1KB
MD5617dba8c532247b888d52b3773f70006
SHA18adcd0cf75e6a0452d89632a59f4672239b1cca6
SHA256ca89628013588635fbf4d2d2c0d64e65048f0f91d060f1bee8de69c6fb7c545f
SHA51265bde66f1c3e88efe3f583544e0d561b03325f58cea07b727559910a6cc17f6f6218a59733bea63d3d927cc270e0f8784075df5ddfee8a177508bc50b972f5dc
-
Filesize
2KB
MD59c7aaf1bf611cf391156e8e813733882
SHA1c533b0a33d9e0af5c00b85dfc099454491662880
SHA256441e41ece768aed095623957accab36fcbea6dd50b9c6509d2bb9199ba06b0d5
SHA512b4beb8f124b19dd3b7780143b4b11f8180116097d6ee4bccfe0114675bb5324a624304ad7c1e2ec4703eadada4d938fcb98d5485d6e238fae8b86701fe785319
-
Filesize
371B
MD548010154a3dbfd39bacba40ddb75fea3
SHA1f418ec856515f8aedc82e40859a3b37215dff04d
SHA2562cac22a9f143a2fa55d60f1dc7fce5a7fbc2668385fa7af8a15fcab0a1eedfc3
SHA51225dbd5cccf4f2f3d00e584d96801bbec2082da5f4f3bf52af6bb5cb6f3fb4098772077f4ca9bb098b8cd9150400e46246e7017c01973ba83054be07ae2ecc600
-
Filesize
371B
MD59ee214a32bd56d88b670a06df6bc5501
SHA1aa3bd99177690e1997cec5766b0dc0983e0bec3e
SHA256c7a5d1da66e7eb1b5ac19b82ee0bda4419941b18c42ac574758100f403e9614a
SHA512664831c400e96acaf5a7172a44fd78daace3070fbc1fe41eccef80ad61e5375d7feae7bba2ab3561a55365e02a330fe50e1e02109645c7714ae537389a673ba9
-
Filesize
6KB
MD5564a3e67929c21dd08e95b7140443a0b
SHA19a77b5269926ebced36102b273ad75d0f9d3fb7e
SHA25642cea72dc31d60970605153b554aab0d5181b739f6b5b5515019dbc7f555f5be
SHA51275ba08c426dc0e331e9f210c1e279db40d559911cd814a40699af738ce5b8c87ef8589d605a9f424b9f662e3cf23fb49360d5856e7b4379f339f3dd33e96e765
-
Filesize
6KB
MD5198c8f574939f60516dc612ea4fc0890
SHA18b1c927695f006ea0777328f01dcb9ae8803ca18
SHA256d26af5eb7f181857084f50694c51db0c5ebda8ffd384a87f19965f0d5cef73f9
SHA51270a2ed3287651600e3a567e4d1c34255a7f935db1980b9ccd56d2eed963e8a1fdd5466d814f6db8b31a6c2f9bb3b30cd8e009f3248c64153185109c179875d1e
-
Filesize
6KB
MD5e3b44c24b32640a47df70fcb4687c6df
SHA16edc741361e7b2664ea270634cf4f3507ee1ea43
SHA256db19e51e661422ae8ceff08f0d7fd7bc4980105d4657e34118e0ab63da626614
SHA512769ecec40f9137c75556193a0c4e73426bb325e3ff4ff757f2eaeed2674a38e38f33e5ce90ba1a11a28d1b0fe0a0725ca123a58804b89a359caa7e35b67fed4e
-
Filesize
294KB
MD58796cd25c7200627b28016094202d772
SHA1289b155856b22706f16c2b563bf0c68c172386fe
SHA25603762d1d8fb46e75d120e4c967ef1915c864997a9fd9a2899361d72100e84d9a
SHA512b0eca936a93ce03d20a64209a07ac2e8cc27196821df687fe949978fb94deaeb06f354c83c502e4240baaabc9352fec0f3082fc933c591f6a72b83c8c919c4e5
-
Filesize
1.8MB
MD56e5042ff1ec6df9aee18f4eea7864524
SHA119e4eaaec31c8512b191138a439b6c4c7ba73d18
SHA256420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c
SHA512ac5c8537bfd0a509ab49911cdf180778e9e47f9f9fb600933b2ba03f939f9bc9834db5a106840382ee648b289cddaf69b55cf969f51b9f89c49c678f1edc202c
-
Filesize
89KB
MD5cc86773e8d2f2c3ade17e0b062aecddb
SHA15e7790ca0b918b8e74e4e85af0c08f81cb4ade0f
SHA25651f4ab5d835ea80224cd5ceec0fcd7cbae80ffc1216b3da35c498cf4b01224cd
SHA5129f5bc37e717063dd0758bbcd77789038aed67b191a0ff23ee6f408a08c9b9992f298643108ed148eacbaaf9322b65acc82f3737e3da664f7a44b96796a1b4350
-
Filesize
2KB
MD54ac6a9d9e192f54598f8b67cf299ea5e
SHA1c3c63fc731603f581ab71bab7651a4d5112b04e6
SHA256f1179bc15a8c644c353af64d6c6c3f13fd2d48eed2fb0b709a167185d2ed806e
SHA5123ff1226c147403aa5afdc515f260849196dec92166273206256ce8437a98dc1dd3b2cf913861e7537ccf36d6bc53537bd49b600e9adb1671f4bdb3d6e3da23a5
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5663dfd0f491e13879d0f057f4bd7376b
SHA1b2755371abbd09f93ef4c32519b00da85ea3b262
SHA256d902c7b393a7715969c9e1374466c2508045bd3a82bc262249d7e83f56a56fab
SHA51286066577dccf9d446b7de878f92cc2a9d4d5c25654f1d3d35fa38e31f57cd8b0c437fcec5ec522086594b6f372260c4d42f96d966ea64d28ecec62916f7eaf93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\pending_pings\2609f8b5-17c3-412b-9b70-eaaa72440aff
Filesize746B
MD5c242e4f577ab04d031ba32802fe2eb67
SHA155017e152ee1714b0eb9bb76900e7d923a57fcdb
SHA2562f4af955c0b4038d57c2bd3eef9b4922b55f22a6cc6251b1bda3d368e971917b
SHA512a9a97cf0bc42408021560c4e78706a22cc531721f56438f472c15c3602f6293af9cd9131d61ee7db8cd6c6dee015d8434ba5cac4afa17730867fde94f023acae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\pending_pings\7fa5904d-003c-4008-a67e-101644a793a8
Filesize10KB
MD5c9fe950ad5a58ca7df2532063fd52666
SHA1e87ed8d40ac532bad5ce6fba623fbb06185e80f5
SHA25639e59e7394b9254aa467aa61c05d85fe4e53ca3164303c502530c2ceba53c77c
SHA5128dbfe30a674dbc0ffa701f3f77978514715f8da01bd47e46f7aa3ef8d10a285ebc7a4c624a6b981b74f504ac0c83a96aba9ad2aefaefedeccbd03d531befbdbb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD557d49adc916249154b5d6bde8176d576
SHA15ebfab1f01f7dec5e866551dd63e5a5030a0c911
SHA25684e89a235e6160e5a4964baaa14502049b53e78658a09319b2b0bd0acd2259d6
SHA51273f450238bc93b08406e5c2468b2532ca6f96e5e377cc0b7edeecbe832e5235bd214e0fdf1b55cc88478ccc3575a54d12481e2b9d9e36b2cf87c4ecc6d974cbd
-
Filesize
7KB
MD5228009da8525eadc341cfcebab95f84f
SHA1b69c24ced6c36d4ee8c70bfbea5c780a0d2b4e77
SHA256d613b86201101506bb4f7288b7b69c3b407075144216892f84da81947aabab86
SHA512b776317db04d01705b7a45fd69fbefc75a84e83b6caaff16587e285d5004711f33a0f0a156016e4ee63ea354583ae278b6ab5b24709559397a819a8c2e67465c
-
Filesize
6KB
MD5edf3099ff68bea98eb3051110ed28c06
SHA1cc9d1b84643143fcde03108979c0b3c7ad31cea2
SHA256379c01dfd1bc481b66d8fcc7e0479512080e227d92358faaf1f4ed07a9578f07
SHA5122829681689a1de44cde975f48015f56a5d610df76e37858ddf34086ddf4f18090e1eaeb56c7b2d7bb1a8501087fbcfc644139f8f9be08294da5ca72f4987ea99
-
Filesize
6KB
MD558f60148e4d61828b777e75506e53689
SHA113ff6ee6a19740da3401a1419803f54c3e773a16
SHA2567b28cdd32011be8a96b2b74611838ce659e810aa65f57b01a5771bd118a88ff1
SHA512003fb201160c1661225201c0d0889a89ea560bb56ee013ec289a4eb992dde69c96369706d46994dce0e1d568e1c4f42e1ca20df75b675c2667210e3fb0f88f6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD50cf53f99c56eada06e104807cff828d2
SHA1a1082063d90eadd4747d4c529056b3a0bfdc1a85
SHA25620d7c22db0a229211155ae2b91d585af6c7751a98730e61b9f6e165fd35e5a81
SHA5121e62075e6ca0931ff6c38fec9274c7a24bf883e87b430aed6e158e6a2f18fad1073be9fee0e3c8d4b8c775eb3b44e2c47a77b1accf66f8cc0b67b3bf185a9ebd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5a04756c71725e06e87f1cd72928626b0
SHA17b96f2fa008f046f0f5f8edd81e8130ec494bd72
SHA2568252acca55fc3131cdfde6c035ac6540105c4c1de6a3424709df66d0241b41ee
SHA51282bbcae2120d257f9ec7cc353e119f1eb76ab4eb565de93b0aa49943955dad403753ad1db586e5e63fa312a6429645971db36457941c45f3372c2c5117cee4b8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5a4627d94b477e3f653435fcf27e2663d
SHA1d5dc31c0165277e469d92453c556786995e2800d
SHA2567c1ea6cee0386d6af3cb7523167c2b880592657ceacc4e56edbc2394575c5c69
SHA5127619d8f8f790c6b47faa75eb3f834640fe6ab684209f2eeb6eff26017c7ebb44972018463bb15d0e7955bed5bde4ebff809754b3c2057d7749bafe82dbe48455