Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe
Resource
win7-20240903-en
General
-
Target
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe
-
Size
1.8MB
-
MD5
b58725b0a514974aae36a20730adc4b3
-
SHA1
a99eb4395fc9a95cad952a7d4bd444fb3baa9103
-
SHA256
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76
-
SHA512
21ed4926463abff571fa30161607cfc58ef2106683295830764a6008d9e6c1228271966c951c030b13db295217b7f568797ebf74fb02a4ed86d198a34d9b7a29
-
SSDEEP
49152:ugpWvpPq4PRzgbjv65CIjyoNaA1bKGfBMK:usWvzgbkaA1TSK
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
axplong.exeaxplong.exeaxplong.exea64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exe96c477193d.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 96c477193d.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
axplong.exe96c477193d.exeaxplong.exeaxplong.exea64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 96c477193d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 96c477193d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 6 IoCs
Processes:
axplong.exe96c477193d.exe592fd7ee92.exeaxplong.exeaxplong.exeaxplong.exepid process 3088 axplong.exe 2080 96c477193d.exe 3528 592fd7ee92.exe 4516 axplong.exe 5596 axplong.exe 2332 axplong.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exe96c477193d.exeaxplong.exeaxplong.exeaxplong.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 96c477193d.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
axplong.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\96c477193d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002733001\\96c477193d.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\592fd7ee92.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002734001\\592fd7ee92.exe" axplong.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1002734001\592fd7ee92.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exe96c477193d.exeaxplong.exeaxplong.exeaxplong.exepid process 1032 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 3088 axplong.exe 2080 96c477193d.exe 4516 axplong.exe 5596 axplong.exe 2332 axplong.exe -
Drops file in Windows directory 1 IoCs
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exedescription ioc process File created C:\Windows\Tasks\axplong.job a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
axplong.exe592fd7ee92.exetaskkill.exetaskkill.exetaskkill.exea64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe96c477193d.exetaskkill.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 592fd7ee92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96c477193d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4964 taskkill.exe 2020 taskkill.exe 1264 taskkill.exe 916 taskkill.exe 232 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exe96c477193d.exe592fd7ee92.exeaxplong.exeaxplong.exeaxplong.exepid process 1032 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 1032 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 3088 axplong.exe 3088 axplong.exe 2080 96c477193d.exe 2080 96c477193d.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 4516 axplong.exe 4516 axplong.exe 5596 axplong.exe 5596 axplong.exe 2332 axplong.exe 2332 axplong.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exedescription pid process Token: SeDebugPrivilege 4964 taskkill.exe Token: SeDebugPrivilege 2020 taskkill.exe Token: SeDebugPrivilege 1264 taskkill.exe Token: SeDebugPrivilege 916 taskkill.exe Token: SeDebugPrivilege 232 taskkill.exe Token: SeDebugPrivilege 2444 firefox.exe Token: SeDebugPrivilege 2444 firefox.exe Token: SeDebugPrivilege 2444 firefox.exe Token: SeDebugPrivilege 2444 firefox.exe Token: SeDebugPrivilege 2444 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe592fd7ee92.exefirefox.exepid process 1032 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
592fd7ee92.exefirefox.exepid process 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe 3528 592fd7ee92.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 2444 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exeaxplong.exe592fd7ee92.exefirefox.exefirefox.exedescription pid process target process PID 1032 wrote to memory of 3088 1032 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe axplong.exe PID 1032 wrote to memory of 3088 1032 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe axplong.exe PID 1032 wrote to memory of 3088 1032 a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe axplong.exe PID 3088 wrote to memory of 2080 3088 axplong.exe 96c477193d.exe PID 3088 wrote to memory of 2080 3088 axplong.exe 96c477193d.exe PID 3088 wrote to memory of 2080 3088 axplong.exe 96c477193d.exe PID 3088 wrote to memory of 3528 3088 axplong.exe 592fd7ee92.exe PID 3088 wrote to memory of 3528 3088 axplong.exe 592fd7ee92.exe PID 3088 wrote to memory of 3528 3088 axplong.exe 592fd7ee92.exe PID 3528 wrote to memory of 4964 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 4964 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 4964 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 2020 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 2020 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 2020 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 1264 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 1264 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 1264 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 916 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 916 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 916 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 232 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 232 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 232 3528 592fd7ee92.exe taskkill.exe PID 3528 wrote to memory of 4436 3528 592fd7ee92.exe firefox.exe PID 3528 wrote to memory of 4436 3528 592fd7ee92.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 4436 wrote to memory of 2444 4436 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4884 2444 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe"C:\Users\Admin\AppData\Local\Temp\a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\1002733001\96c477193d.exe"C:\Users\Admin\AppData\Local\Temp\1002733001\96c477193d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\1002734001\592fd7ee92.exe"C:\Users\Admin\AppData\Local\Temp\1002734001\592fd7ee92.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {72342d38-37c8-441a-b344-9d89b05cd3f8} 2444 "\\.\pipe\gecko-crash-server-pipe.2444" gpu6⤵PID:4884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f7c9fc4-43fb-4dd7-891d-612fceea380b} 2444 "\\.\pipe\gecko-crash-server-pipe.2444" socket6⤵PID:3748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2864 -childID 1 -isForBrowser -prefsHandle 2820 -prefMapHandle 3108 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {415953c0-f33b-413c-b009-f39de42bcc48} 2444 "\\.\pipe\gecko-crash-server-pipe.2444" tab6⤵PID:2064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3960 -childID 2 -isForBrowser -prefsHandle 3948 -prefMapHandle 3944 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2133ee17-bf7f-4408-af0e-ae85d73fa46d} 2444 "\\.\pipe\gecko-crash-server-pipe.2444" tab6⤵PID:5008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4420 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4412 -prefMapHandle 4416 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0a2a703-8390-4dbb-ad66-a0a4297c9289} 2444 "\\.\pipe\gecko-crash-server-pipe.2444" utility6⤵
- Checks processor information in registry
PID:4348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 3 -isForBrowser -prefsHandle 4412 -prefMapHandle 5556 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e074b2af-2907-4be4-8d20-0801da65412b} 2444 "\\.\pipe\gecko-crash-server-pipe.2444" tab6⤵PID:372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5804 -childID 4 -isForBrowser -prefsHandle 5212 -prefMapHandle 5608 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c63629c-5e52-46a7-9126-ab2fad98a3ae} 2444 "\\.\pipe\gecko-crash-server-pipe.2444" tab6⤵PID:4680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6008 -childID 5 -isForBrowser -prefsHandle 6012 -prefMapHandle 5556 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57650cb9-1b69-4e19-a30f-6b1ec8fbab1a} 2444 "\\.\pipe\gecko-crash-server-pipe.2444" tab6⤵PID:4364
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5596
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD512389a9e80ffcb8314ae1c0b262c51c7
SHA1a03089d31936e0c3de3d3a317fdb71a6bb6693b7
SHA256be3922f232abe5708d0e182b8648888c03b93d8813816abb71a46f5ffb683440
SHA5120d3758c9df3fc6cac040515fd50d8e0201b0409bae48c279adb071c743c93a620038209fbb3d819eb356a95b3f2d54d3e0789250c22cd2d251f53137ee94b9c8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD57af340108e85367cfda07f9a5e0d366e
SHA1026ff3b2168ec853f0c46a7f2774637ee15db2b8
SHA256e9aaeab66866031274a3f527aceefaa119cb10850947623ab7a7acc7078782c8
SHA5123db38ad774dd6f8271daf3349f4d6071e235492131bf376e35b24f607224727253c02b2b6a5a524b6d071a4df6e3bbf7899e97e1168eac12e06a19bf974f1707
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5ac7cc5926822d4c619559a26b503f86d
SHA10ffa3925024468eaeba27301a52c70d2c5f41356
SHA256b349b93bf785eefc8fc05032d2df4ae471d2f73c5d7ef250542457fb27a117d8
SHA51268a88a593b23a3ef1b8092b5c2a2c1682a19ffb8945e5d97db6bddb2ee56da22f5d447b45039f57317ce08ccdbdcdb6a0c4ba0446a1848da2c92f6638cf0087d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD57b198e4956c4f8eebe753c5f6dca4a51
SHA15fc7da16c5c1f9b730d9bdbe171b4f54fb16d688
SHA2562cf4e1d94ee41e3eec37f4940f7714e56e107718128633eeec830403cf5ec093
SHA512acf777523fc0bef8736bd39ae663e62ce1e9952b43daac10e54bef94495953aa70229a778d6a03c5311bd9493c5410fbcd8ec1c266f2e9a14f0bf98aab380c7d
-
Filesize
1.7MB
MD5ffac26655646c2647f8ac6df67bc7f78
SHA1d9477217df541787f27c9988fc83ff4bbe8a2a89
SHA2562e10cddae366ce66f095b26c0fd5e65326202206c71b67537630736cc946e185
SHA512c3892a1949ceca393ff08413c4b6a955c8578a6f89f716a708a4be184a8899909553202f08398fb4e73eb8ac645d88a01e296318b6ab05651b213a550789fad4
-
Filesize
898KB
MD5fb3b84a95b63a126b5aecb206dc2d1d6
SHA1c4834e4efe96d8e62009f372a0c087d54c868652
SHA2562aa775e407d179dda746626d61e9fa9a2bb09959864775c5d8dad1e3fb522fda
SHA5129872c8f3ee0ee3af9d116a7e3caaaea7e640a0e838952791e13b6988346eef57bbaa1dcdadb5f8eb016d1b5d5c720826eb8c940869e98692c0651ef0b8cfe35e
-
Filesize
1.8MB
MD5b58725b0a514974aae36a20730adc4b3
SHA1a99eb4395fc9a95cad952a7d4bd444fb3baa9103
SHA256a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76
SHA51221ed4926463abff571fa30161607cfc58ef2106683295830764a6008d9e6c1228271966c951c030b13db295217b7f568797ebf74fb02a4ed86d198a34d9b7a29
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize7KB
MD55ce4d8c179b3043a81db5c47a5473022
SHA1ee58877878b92ace42d1f7b1fe8f1dbfb36dab26
SHA256defee53246bc3ad9528023edc489dead16d6ba3b9beb6cbb45b6063a55aacdf6
SHA51296b6b8ee233b6cd4b0f1a6f2f684cebf774822147fc21ab46a566f99fe04e8f8b1cd9f175eedae5a06cac9af8dc8db54873b03761a7492851a3661848e74322b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize7KB
MD578b8f0612475029b5666a02d0841ba93
SHA142a8eb41d38eb4c76a50f3360d20c86ad5f0da6c
SHA2568a6d153cce673d26402b200eafd58268097bc727112c8ae48cbefda609b70556
SHA512d54bc29bc4d9dfee96aba3df99e94528f467ca5b3b29c856bca53ebd6051a13f31eba238fa718f1c7352b67cfe56d1be8b8280a768a3647ae537189ed9c36258
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize18KB
MD5ca0409cc8e2848b7481e7e1d8ee31985
SHA1a5346432d83f769717ac35345cdfe232c0b633ef
SHA256525367fd27f6ea91a4145dab9583dda783539da0bd6836c228f9d939560a7f59
SHA51296c42c47e43fe8171138dd0088453fe8f2de26d795f98b20caeb2b8168857f327b383f849a8c04badfe9bcfd1fa236bcb1b4c26164ffb27ad04dca16e8257225
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize12KB
MD58c07b5940a12fe0e27c8ee350ec94790
SHA15db3a2085456c0e4aafd9d24a82bbdd8805d1ebf
SHA256baad1398f7eecbf101ef4b24bb130016127fce4b8c58ecb56ae2272c84a1f53e
SHA51210672c57c4a46a54aad3cc0d40e767821a811b0cc775c831b6d68d68c7c7fbd15ef071f2d16406004c273f6cdfa4e5bca19c551eddf61596b7223fb0fadb0c78
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5277bfbf78bd6efff566157799723272d
SHA1e41b4ccaca4c49a7f866e6bf58199127eb1c8365
SHA256a1a55e809a8a73f372777d1c21f9d1431ddaa2598b4b3601d3fecb9c83bba373
SHA512a5ed280266e4abd79d6438220b9d09d68b60aff9939bb74720eedec6e90b648d83606dfbd6c7a0ccdf89d6c07b52c5f95876e6d78d30afb07b1421003312e90a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD530f87461ddbe4b21427a3b4327290b4b
SHA18dd9e7c431ba07abd10aa85cec4031c84d05639a
SHA256408e061fbf50e87bb647f8687d70a46d237c896463a2a8839db7776a1b91bc13
SHA512619d19331ae7786800953f9377d267938b9131b48d9a8795480482ce5ea882f17bdc5a2a5f6375d3fae58cc2281cc747c442e64aabd3bbffab837e8fecda86cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5a85961520e6c7a617903263c9fe6f764
SHA1a95f234e3079fa56f5243c22831b5e5ce7ce4737
SHA256ec4538ba116c38100746dac3606fc12823cbcff9df04a6016ee33ab48a387b50
SHA512d639d3128c498464366fd6c41b298e289b2ad5f6293a0632a9f1f8302eec21385d5f1c8e41eb7c144c449ac4aa21c9cfb8f967eb8bb539b191995d522fb813d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5f528f14dfefa16cc32399fff8a95bf60
SHA1bf344e3f175e529da82f0e28781a698ee9183a63
SHA25648e73899d2bfad9b77342ce35558218ed1b87f452b9349caf25bfb57511d4472
SHA512d2a906429ebc7d37e264e23c80f2cc7c49eac364664dbb4b23aaa5c3b3d669cf174dadbe3462e71d355d91a4d5db6cff10d0499dcf72e34eb7cc4b3b61a2523b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD59d1d75e645a7dbb996a00e2d8ee299a1
SHA1a975784866778eddfc9c49984bfd18a33e4fd8f5
SHA2567554c8f802b8e843bbf70a01c6674bef5ebb333ad29adaa34e112c5e648b2bad
SHA512ccf3f1e710ac8f6913e1f6ff261ca4a382e2c5f72017ae3937de246c65dbe31fc176e9d632579414979be5f427d84c8f9cde74c7f070a0fe047af99c7bfe3e06
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\9951396a-e746-404f-89d8-608c230f7a77
Filesize659B
MD543ca67037c73f4626cf12715fa53faae
SHA1e6ccfa9caefe0d21c95e44f326a2440b1f4baed9
SHA256ec00b87ce3f67d972de5fef49cf58b40444dc2f27066ecc0a6a684fc0541c224
SHA5120f5331cc19d14ad1e54524263c25cacc5bffce820224065d80b3a84b48fa2bcdad0085346518ddfb6605ab26a4c852b08768703398ea6f73cd9249042b3e4cfc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\b9bc11fb-35d6-43c2-a511-c624f61e1a87
Filesize982B
MD5baf775e2a46a8cd5ee6036f2431d91f4
SHA12f91b17b49a54a7c91f27594ca85baaec7b68809
SHA2567f99819bd0188562ee29a2e6c73c537fa3d01da040df5de2dcd148ca33d87184
SHA5125be7eac84465549891d254788f8ea06b721501df74bea7b41fc9b449d366dd679b78698e79ad218997ec70b77e166d0641457da11692436c65101581a8d6d460
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD585f6fae1b60cd22429015498c34fcfb8
SHA10e4021e60dacb306670d9decd9f51375cea1db39
SHA25627a512cdbcf2d5a65b9561cbcf7128650fc246b7948b4df952ed38fa3959a3df
SHA51299009aaac03805b6ce954c4da9d78f34ac7f4191d55a269395f579bee6b83cf0a194046126a8e98acdbf2e0222dfe8db843a17c0ddc11fdaeded53237ae9e456
-
Filesize
10KB
MD5a7339dcbaed9414d95fe1359ec1517db
SHA11380839724a9c6fecd321bb2bf48fb4491fe3e20
SHA2567741cd2eccbc1fa2d90de41adeeeec6fcc0dc8a03456c0cbd216cce546390206
SHA51297a6344f70038090cb1d6935648abdc9ba40508e75993a31ced8292b7fbf6c406bf9b1021a2b436475d9892f0c7cfee58718275171737b756907b3aa9ece1aed
-
Filesize
10KB
MD5f94d010bd867c226891f069c4bbdacab
SHA16f9cb45afdbd05ea11c4ec135275530af95ae73f
SHA256651b3589e894db484c78145d5c3593cc278e282f8cff68d67d6002869b0f0e43
SHA51282f778dfc1e850074f77b7682284b15720c18c3df2d69b0658e1fac2f71cedb3e5dbc2b630b4460ef4044e072c475b3b1148acc445b7caccc6db152ea57d0f85
-
Filesize
12KB
MD571e3528ecca1ede38ec7dc7e0adbee9f
SHA1e6cd6da3d39315b6526e5911c730dded7a94051a
SHA25683d0cdb906eaa31e1531d19212dedcb622a19a2010950964df61f0b471be0497
SHA5122e3ed76bee16ccbdfe7c6538556eb48bda740092011edd17e2e12889f5866bd5b9927e6a0c2c98615d7d63124f315bd88875c5d738a6447bd196b0450680e8ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.8MB
MD5481fc4e3fee6436632784bd98ad9b4a1
SHA18d43c3dc3bf6cac6f8162888a00a86ccb000b24c
SHA256ad48024487b0184ee01babd406fdd88b13abe00f7b6d7f0bc909894b69a46d6c
SHA512da79cd2eb2b59aa703a58f79241fb615d70b4c918ff6ba1b99202551e56f68cee79a08cfe52999bccd266071ec2988df9c6889e9498fd7e87e7aec1d0de1de55