Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-10-2024 02:42
Behavioral task
behavioral1
Sample
[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar
Resource
win11-20241007-en
General
-
Target
[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar
-
Size
332KB
-
MD5
c6f19bd285ac0c699435b607a163bedd
-
SHA1
959fd4aa99f9550359eeccf5770565fb0503104d
-
SHA256
21810e5c5329762599cdb396feba7c560e42808f11d7eda6ea8afcc0d3d1cd1d
-
SHA512
96be9a0c64c27cca97b690e9b8e07db114271b7888b4acacf8aed0a89750ab6fd967e48cd277abe3e359726af1f094e8c33b6b4e0b4b5561559189e8577ca708
-
SSDEEP
6144:JZjgS007NNMX/+DoklCAFNWClCA+jp02GmaZ/ZJSEPavLFjt+Ww:JZNNNzbCClCA+jp02GmWhJnav5jUj
Malware Config
Signatures
-
Ratty Rat payload 1 IoCs
resource yara_rule behavioral3/files/0x000800000001ac4e-14.dat family_ratty -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar java.exe -
Loads dropped DLL 1 IoCs
pid Process 168 java.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3972 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar = "C:\\Users\\Admin\\AppData\\Roaming\\[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar" REG.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance java.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance java.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2504 REG.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 540 firefox.exe Token: SeDebugPrivilege 540 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 540 firefox.exe 540 firefox.exe 540 firefox.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 540 firefox.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe 168 java.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 168 wrote to memory of 3972 168 java.exe 75 PID 168 wrote to memory of 3972 168 java.exe 75 PID 168 wrote to memory of 2504 168 java.exe 77 PID 168 wrote to memory of 2504 168 java.exe 77 PID 168 wrote to memory of 2112 168 java.exe 78 PID 168 wrote to memory of 2112 168 java.exe 78 PID 168 wrote to memory of 1932 168 java.exe 79 PID 168 wrote to memory of 1932 168 java.exe 79 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 4692 wrote to memory of 540 4692 firefox.exe 85 PID 540 wrote to memory of 1960 540 firefox.exe 86 PID 540 wrote to memory of 1960 540 firefox.exe 86 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 PID 540 wrote to memory of 4620 540 firefox.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2112 attrib.exe 1932 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar1⤵
- Drops startup file
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3972
-
-
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar" /d "C:\Users\Admin\AppData\Roaming\[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2504
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar2⤵
- Views/modifies file attributes
PID:2112
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar2⤵
- Views/modifies file attributes
PID:1932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="540.0.613234981\1197392676" -parentBuildID 20221007134813 -prefsHandle 1692 -prefMapHandle 1700 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {718b582e-dc7e-4137-bb64-a37a1629ce0d} 540 "\\.\pipe\gecko-crash-server-pipe.540" 1776 1c297918e58 gpu3⤵PID:1960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="540.1.1388564422\818080400" -parentBuildID 20221007134813 -prefsHandle 2120 -prefMapHandle 2116 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d05ea462-d44c-441e-9459-dc6dc0e48450} 540 "\\.\pipe\gecko-crash-server-pipe.540" 2132 1c2967f9858 socket3⤵PID:4620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="540.2.1159476224\1117087548" -childID 1 -isForBrowser -prefsHandle 2704 -prefMapHandle 2668 -prefsLen 20931 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3896f359-c9d5-4a85-a47d-54d5adecf4ac} 540 "\\.\pipe\gecko-crash-server-pipe.540" 2832 1c29abf6958 tab3⤵PID:1524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="540.3.1040559428\115346473" -childID 2 -isForBrowser -prefsHandle 3472 -prefMapHandle 3468 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {75c88154-692b-458b-9c9b-38e4ff87c5d6} 540 "\\.\pipe\gecko-crash-server-pipe.540" 3484 1c299438658 tab3⤵PID:4184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="540.4.2139034639\1094790452" -childID 3 -isForBrowser -prefsHandle 3880 -prefMapHandle 3876 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {47a0273b-c0a4-4270-974e-54c07329d350} 540 "\\.\pipe\gecko-crash-server-pipe.540" 3892 1c29bde0f58 tab3⤵PID:2204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="540.5.1208662957\1190529655" -childID 4 -isForBrowser -prefsHandle 4824 -prefMapHandle 4820 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3a7b285-7692-4477-b6a6-9c16a1614323} 540 "\\.\pipe\gecko-crash-server-pipe.540" 4832 1c28b86d058 tab3⤵PID:4392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="540.6.1805606647\999438858" -childID 5 -isForBrowser -prefsHandle 4980 -prefMapHandle 4984 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b74a06d-a656-4386-ba29-4b8fb2bbdd22} 540 "\\.\pipe\gecko-crash-server-pipe.540" 4972 1c29944ff58 tab3⤵PID:2500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="540.7.1120108391\1916483898" -childID 6 -isForBrowser -prefsHandle 5172 -prefMapHandle 5176 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1072 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {98a97210-e2a8-4ea0-acab-aaf8b4229e4a} 540 "\\.\pipe\gecko-crash-server-pipe.540" 5164 1c299450258 tab3⤵PID:4708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5d07120ab84b43c0d48edcfdf35fdc1df
SHA1144d708b51b70a78c71f5a66225e565ad09f1387
SHA2560e7bea42476a5a42ab72c9fed43a4471aa54201692cc3e1a2ea4f8cbd39e114f
SHA5129457944ad61fcc74da5d185db800f2bd8d189b0c15b8fb168d3ba4304dc96393a689f5548578c2a97e168a33a7578a158a74f1b670001c155cbad3b0bfdfde6b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\cache2\entries\0305BF7FE660AF5F32B4319E4C7EF7A7B70257A3
Filesize13KB
MD551c5474ad43a63a15babfc5c82f16bf4
SHA189f5f63c6840cb2f42c436e3a2ed16539da88492
SHA2566c7502a84947b0b1362afa7b307b71c39e7eeba90fa4f88336e6be93bea7c1ba
SHA512cd6544c9dc758a4b756a3935cc9f3eed6e96701d8f7e5380e7c5a7f6f020b3fc0924e8a41ed6893c937319704874a0f1f260392e04f53da0056930de648cfb23
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD5621a80297ee8fd50a8d57b33fd177bfd
SHA1f19f2bb78da56a9c7b24c07a3c91dabd924d6327
SHA2563d07d760848611ba63bf2294b0bfd29984948ab2f74d5a44caad1d3b61c7f15f
SHA51211aef85055b5b699019cd01565662a653ca823648ac79f8ce92735a81f4dce903c65038627225f2bf99bf7c147cde0e37340b0b96545385886c1e3fd0d9057a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\datareporting\glean\pending_pings\a16f4db3-5f60-4f52-bdc2-4c0d10fb3e78
Filesize734B
MD5de34cb20dc10b36278d1a082e105c4b2
SHA1498d8b465184ba80deb7098d02456c2b27faa285
SHA25608df938f5a20c5d90fc580bc9efbcbc06246188e1d60f1a0e78a313656f1dab9
SHA5127de1443565806cf008bd88376be24b16937e1c1f0527fa5700a61314d9a278659ffa655f4470b0f6324e0a85f54db83609f4ff6922a12c4c46584b26f0b168e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD555a1684e693bae39ff608f2ddf49dda4
SHA1ee431e4b8c54b35e2dd9ce87ab106ea6760d452b
SHA25645daab0d387e809a96e325e2ded8601a35726d0f5964403a9987f4baf4720cc6
SHA512fdf59fc3c9503c46bfb85125929076037945525f6083709fc05ae552478c1fdbceaa12b6d34dd33d54b580db3db852bd9c3a7630e97a2156f0064ab763c8f6b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5cd84ac107cb12668662d45f929de8e45
SHA1589cb57e6dab62712e0d2d2affdccc64ba5e379c
SHA256b8fb1343290430a17c81f43d2e096bca6e7bb92de2cc5c0596b5318966c3e186
SHA512738fe97ad12d8b4914dde7f171c67ceef8429306d7d10e532c812eb97582b4ae8eaaf490dc069484a2bcef9e132171aa01544eb52c9a7c494589d7f116f58f90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize7.8MB
MD573a745db9da2378a149f2bb175504883
SHA1e06e4d683f7637af1b10cd376cadb562a2611b12
SHA25604f82b2ca2a4351bdf39a47866f2caff4367d3ade68348fafbc387ed1371bcf1
SHA512c4bc998bddbad71ff2ef24b5bef690daa28b10fb69175c643e1ff8abf92bd2e89e2cb3d5437312876922892a1545ff9733ea574c8adee57a2b763922af7867a9
-
C:\Users\Admin\AppData\Roaming\[RU]DESKTOP-33B9CHF@V#eff870d155ad9996e86173d19c2373fd3cea5780.zip.jar
Filesize332KB
MD5c6f19bd285ac0c699435b607a163bedd
SHA1959fd4aa99f9550359eeccf5770565fb0503104d
SHA25621810e5c5329762599cdb396feba7c560e42808f11d7eda6ea8afcc0d3d1cd1d
SHA51296be9a0c64c27cca97b690e9b8e07db114271b7888b4acacf8aed0a89750ab6fd967e48cd277abe3e359726af1f094e8c33b6b4e0b4b5561559189e8577ca708
-
Filesize
83KB
MD555f4de7f270663b3dc712b8c9eed422a
SHA17432773eb4d09dc286d43fcc77ddb0e1e3bce2b4
SHA25647c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25
SHA5129da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996