Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
7b79bbb0cffcd10a2c1ec7c50834030a
-
SHA1
5e72bee282ef61fa7f65bd10b58b6deb0f8dc2d8
-
SHA256
561a986291b7ae3b790dd250da49f5011828cf18faffd9aad325d712cef4595f
-
SHA512
fdc8ef7c76ccf238ec6393e75f8314921f41a1a37a30f067c8860033a9752802091b84f23f4f901dd195c15de15d37548f0230e3bc23a416459fa490f68980c0
-
SSDEEP
24576:dlfJRq0Xj0f5naPOcMspJ+ZRsHSOY9cLmI2DWk337f0IJlZB3pQ4VTLlFO8xhh8b:dxJRq5n23wR8SdVx3L0AZB7VFZvcGJ
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://peepburry828.sbs/api
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
235d18ffdb.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 235d18ffdb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 235d18ffdb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 235d18ffdb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 235d18ffdb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 235d18ffdb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 235d18ffdb.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
skotes.exerodda.exe52b37aa6ca.exe0cb59fae01.exefe9f8f3eeb.exe235d18ffdb.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rodda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 52b37aa6ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0cb59fae01.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fe9f8f3eeb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 235d18ffdb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rodda.exe52b37aa6ca.exefile.exeskotes.exefe9f8f3eeb.exe0cb59fae01.exe235d18ffdb.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 52b37aa6ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 52b37aa6ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fe9f8f3eeb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0cb59fae01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0cb59fae01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 235d18ffdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 235d18ffdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fe9f8f3eeb.exe -
Executes dropped EXE 7 IoCs
Processes:
skotes.exerodda.exe52b37aa6ca.exe0cb59fae01.exefe9f8f3eeb.exe44a4d24ce7.exe235d18ffdb.exepid process 2568 skotes.exe 3028 rodda.exe 956 52b37aa6ca.exe 2452 0cb59fae01.exe 2016 fe9f8f3eeb.exe 2736 44a4d24ce7.exe 2596 235d18ffdb.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
235d18ffdb.exefile.exeskotes.exerodda.exe52b37aa6ca.exe0cb59fae01.exefe9f8f3eeb.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 235d18ffdb.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine rodda.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 52b37aa6ca.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 0cb59fae01.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine fe9f8f3eeb.exe -
Loads dropped DLL 11 IoCs
Processes:
file.exeskotes.exepid process 2400 file.exe 2568 skotes.exe 2568 skotes.exe 2568 skotes.exe 2568 skotes.exe 2568 skotes.exe 2568 skotes.exe 2568 skotes.exe 2568 skotes.exe 2568 skotes.exe 2568 skotes.exe -
Processes:
235d18ffdb.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 235d18ffdb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 235d18ffdb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\0cb59fae01.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007346001\\0cb59fae01.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\fe9f8f3eeb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007347001\\fe9f8f3eeb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\44a4d24ce7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007348001\\44a4d24ce7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\235d18ffdb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007349001\\235d18ffdb.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007348001\44a4d24ce7.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
file.exeskotes.exerodda.exe52b37aa6ca.exe0cb59fae01.exefe9f8f3eeb.exe235d18ffdb.exepid process 2400 file.exe 2568 skotes.exe 3028 rodda.exe 956 52b37aa6ca.exe 2452 0cb59fae01.exe 2016 fe9f8f3eeb.exe 2596 235d18ffdb.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exetaskkill.exefile.exerodda.exe52b37aa6ca.exe0cb59fae01.exetaskkill.exetaskkill.exeskotes.exefe9f8f3eeb.exe44a4d24ce7.exetaskkill.exe235d18ffdb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rodda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52b37aa6ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cb59fae01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe9f8f3eeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44a4d24ce7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 235d18ffdb.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2360 taskkill.exe 2116 taskkill.exe 2892 taskkill.exe 2520 taskkill.exe 588 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings firefox.exe -
Processes:
0cb59fae01.exerodda.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 0cb59fae01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 rodda.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 rodda.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 rodda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 0cb59fae01.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
file.exeskotes.exerodda.exe52b37aa6ca.exe0cb59fae01.exefe9f8f3eeb.exe44a4d24ce7.exe235d18ffdb.exepid process 2400 file.exe 2568 skotes.exe 3028 rodda.exe 956 52b37aa6ca.exe 2452 0cb59fae01.exe 2016 fe9f8f3eeb.exe 2736 44a4d24ce7.exe 2596 235d18ffdb.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2596 235d18ffdb.exe 2596 235d18ffdb.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe235d18ffdb.exedescription pid process Token: SeDebugPrivilege 2360 taskkill.exe Token: SeDebugPrivilege 2116 taskkill.exe Token: SeDebugPrivilege 2892 taskkill.exe Token: SeDebugPrivilege 2520 taskkill.exe Token: SeDebugPrivilege 588 taskkill.exe Token: SeDebugPrivilege 1232 firefox.exe Token: SeDebugPrivilege 1232 firefox.exe Token: SeDebugPrivilege 2596 235d18ffdb.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
Processes:
file.exe44a4d24ce7.exefirefox.exepid process 2400 file.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 1232 firefox.exe 1232 firefox.exe 1232 firefox.exe 1232 firefox.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe -
Suspicious use of SendNotifyMessage 13 IoCs
Processes:
44a4d24ce7.exefirefox.exepid process 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 1232 firefox.exe 1232 firefox.exe 1232 firefox.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe 2736 44a4d24ce7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exe44a4d24ce7.exefirefox.exefirefox.exedescription pid process target process PID 2400 wrote to memory of 2568 2400 file.exe skotes.exe PID 2400 wrote to memory of 2568 2400 file.exe skotes.exe PID 2400 wrote to memory of 2568 2400 file.exe skotes.exe PID 2400 wrote to memory of 2568 2400 file.exe skotes.exe PID 2568 wrote to memory of 3028 2568 skotes.exe rodda.exe PID 2568 wrote to memory of 3028 2568 skotes.exe rodda.exe PID 2568 wrote to memory of 3028 2568 skotes.exe rodda.exe PID 2568 wrote to memory of 3028 2568 skotes.exe rodda.exe PID 2568 wrote to memory of 956 2568 skotes.exe 52b37aa6ca.exe PID 2568 wrote to memory of 956 2568 skotes.exe 52b37aa6ca.exe PID 2568 wrote to memory of 956 2568 skotes.exe 52b37aa6ca.exe PID 2568 wrote to memory of 956 2568 skotes.exe 52b37aa6ca.exe PID 2568 wrote to memory of 2452 2568 skotes.exe 0cb59fae01.exe PID 2568 wrote to memory of 2452 2568 skotes.exe 0cb59fae01.exe PID 2568 wrote to memory of 2452 2568 skotes.exe 0cb59fae01.exe PID 2568 wrote to memory of 2452 2568 skotes.exe 0cb59fae01.exe PID 2568 wrote to memory of 2016 2568 skotes.exe fe9f8f3eeb.exe PID 2568 wrote to memory of 2016 2568 skotes.exe fe9f8f3eeb.exe PID 2568 wrote to memory of 2016 2568 skotes.exe fe9f8f3eeb.exe PID 2568 wrote to memory of 2016 2568 skotes.exe fe9f8f3eeb.exe PID 2568 wrote to memory of 2736 2568 skotes.exe 44a4d24ce7.exe PID 2568 wrote to memory of 2736 2568 skotes.exe 44a4d24ce7.exe PID 2568 wrote to memory of 2736 2568 skotes.exe 44a4d24ce7.exe PID 2568 wrote to memory of 2736 2568 skotes.exe 44a4d24ce7.exe PID 2736 wrote to memory of 2360 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2360 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2360 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2360 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2116 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2116 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2116 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2116 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2892 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2892 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2892 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2892 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2520 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2520 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2520 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2520 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 588 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 588 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 588 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 588 2736 44a4d24ce7.exe taskkill.exe PID 2736 wrote to memory of 2324 2736 44a4d24ce7.exe firefox.exe PID 2736 wrote to memory of 2324 2736 44a4d24ce7.exe firefox.exe PID 2736 wrote to memory of 2324 2736 44a4d24ce7.exe firefox.exe PID 2736 wrote to memory of 2324 2736 44a4d24ce7.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 1232 2324 firefox.exe firefox.exe PID 1232 wrote to memory of 2816 1232 firefox.exe firefox.exe PID 1232 wrote to memory of 2816 1232 firefox.exe firefox.exe PID 1232 wrote to memory of 2816 1232 firefox.exe firefox.exe PID 1232 wrote to memory of 1844 1232 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\1007341001\52b37aa6ca.exe"C:\Users\Admin\AppData\Local\Temp\1007341001\52b37aa6ca.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\1007346001\0cb59fae01.exe"C:\Users\Admin\AppData\Local\Temp\1007346001\0cb59fae01.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\1007347001\fe9f8f3eeb.exe"C:\Users\Admin\AppData\Local\Temp\1007347001\fe9f8f3eeb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\1007348001\44a4d24ce7.exe"C:\Users\Admin\AppData\Local\Temp\1007348001\44a4d24ce7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1232.0.307388113\1494237981" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1092 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {83dd6b45-2fd3-4e8e-8036-92d4ff25da63} 1232 "\\.\pipe\gecko-crash-server-pipe.1232" 1324 10fd6458 gpu6⤵PID:2816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1232.1.2029045743\609522401" -parentBuildID 20221007134813 -prefsHandle 1560 -prefMapHandle 1556 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {721d144a-9ef3-4fe1-ab93-8aa4db92a864} 1232 "\\.\pipe\gecko-crash-server-pipe.1232" 1572 42fa558 socket6⤵PID:1844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1232.2.1951505382\1320598827" -childID 1 -isForBrowser -prefsHandle 1952 -prefMapHandle 1948 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e98d74b-4ff0-4958-93e3-48ebcc92f27c} 1232 "\\.\pipe\gecko-crash-server-pipe.1232" 1964 10f63958 tab6⤵PID:676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1232.3.328228178\1277171184" -childID 2 -isForBrowser -prefsHandle 2812 -prefMapHandle 2808 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d863d2df-132d-4c45-868c-86dcdd07d6fb} 1232 "\\.\pipe\gecko-crash-server-pipe.1232" 2824 1c8df058 tab6⤵PID:992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1232.4.1901289190\1731575326" -childID 3 -isForBrowser -prefsHandle 3868 -prefMapHandle 3856 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7dfa988a-57c2-4018-bc46-5a9532937626} 1232 "\\.\pipe\gecko-crash-server-pipe.1232" 3880 1b80b558 tab6⤵PID:1628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1232.5.462590614\158826507" -childID 4 -isForBrowser -prefsHandle 3992 -prefMapHandle 3996 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a544bfb-49a3-47bd-a8e8-e33356b7ee2e} 1232 "\\.\pipe\gecko-crash-server-pipe.1232" 3980 1b80ee58 tab6⤵PID:2052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1232.6.2002741129\1668971661" -childID 5 -isForBrowser -prefsHandle 4160 -prefMapHandle 4164 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {53488e2f-868d-4557-8e41-d7c1b5c67fd5} 1232 "\\.\pipe\gecko-crash-server-pipe.1232" 4148 1b80cd58 tab6⤵PID:2016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007349001\235d18ffdb.exe"C:\Users\Admin\AppData\Local\Temp\1007349001\235d18ffdb.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp
Filesize31KB
MD52add74dbf6f483776d5d581282fe453a
SHA130db83d11d74980d0931e7db738c13d2fcf3f4b6
SHA256db640f4f78ffd932d16de5c91149dd76de2e5a5de7e210fccbf772c32e0f6fa4
SHA51262b18f1a649b18a8772330f655ccaa1eb5441abd7095bcbf53534c3a81afe0ee8e217e54be977f0bacffce442d5821b7253ac80e761cdc36ff1e9954946792c1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.8MB
MD586a5d7f66a6aa908260e684c97079ef3
SHA1cc3beab7c38ee4a341bce58937eb8433e4b30990
SHA256b4c6b9f9f3bd55090817a9a10fec28be0db3d90578f6c1cc89a9cce3363a2f91
SHA512bb5087e5729cf2ad204de2259c93ff77fa051212759aae0cd67530211409c205f0bec6cc2eac855fb35515af6fb444f6c1d2c1a42abc6aa4d4d455f1665c62de
-
Filesize
4.2MB
MD5ddc37e97b7f6f293fd3249dde8626b60
SHA14408410263886ec4e02dc3eea37f8c89c361db49
SHA2561e54e10e7d664fbe488c896545d9a706551f83c1b765ef96d9e511850b256039
SHA5125743a4eb15854402873ec8fb8dfdd9fb5cc94a45f958180beb8678e24a726b1e35a6fc38055abc3ea17ef86975650d53e7d7dc5419747b191e680b80868f4366
-
Filesize
1.8MB
MD50052b3199e0f2d283c8589e137f861b9
SHA1890e0ec166ff2a4bc5815a6cdb7db006c1dbed3f
SHA25629fc9219bf04bc8af576e3e972b250dca95c518b912ef2e4b97b2253f876447a
SHA5124d19391bc8ee0072e4aee9c45d5d748ca87c648b1b006116b17ea2c62e04316ef9e0aed2a3e96e695bebba038498ba7e5754a4fa169cb2d36a4e8b4943c4851c
-
Filesize
1.7MB
MD597de1d3cfa763a50d7195d5bd0c3594c
SHA13429706674f3a675e916097140d46b4e75706367
SHA25690070e4b5115c14092fc257bb696d71025d6da274a339913d9f66da915dada16
SHA512ab16e913bed783d50c3fa0f3a385c71cb5e197d0c3b3facfe45821ad0ee52c78879b2fccb587967c87488eca4accc587a2825ecd5c8e340a7f5030e5736feb63
-
Filesize
900KB
MD58497a1a62a06f49fb7da020a2ac7cb51
SHA108f097ad043bc698a4a8a142587edcab55bb4a9c
SHA256437ffdd5f9fd171113b2e13401b127b21d2c8f95d47feb897cabd9d4a04bf437
SHA512e2bb47cd34330337b1620c1e853ab6397b42335bbecec45513080eea0c2c575b96aed521a29285e33b60f4ac6a6e91866e4ab1f5d2a31adae9062c3a77214cad
-
Filesize
2.7MB
MD59ac8445cce2c068f85de4e97c38041a1
SHA131f85847064c2181505e9e8b0cb018f480ffadb0
SHA2562a06994be891b47d92c40b83e4b33ec355b587bbd00c7c49c2ae266f1e06c621
SHA5126d3a6893269032921bb643188644ce7af79603ced800dce380a42d150948063393d92a2c055dd6707e156346047714408e8ae2964117548a5002826c08771183
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD57b79bbb0cffcd10a2c1ec7c50834030a
SHA15e72bee282ef61fa7f65bd10b58b6deb0f8dc2d8
SHA256561a986291b7ae3b790dd250da49f5011828cf18faffd9aad325d712cef4595f
SHA512fdc8ef7c76ccf238ec6393e75f8314921f41a1a37a30f067c8860033a9752802091b84f23f4f901dd195c15de15d37548f0230e3bc23a416459fa490f68980c0
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD55551a6b5385f6def7585566ea91aaad9
SHA19da3e247f02b186795d2fe92e1ee249d2dc8ee8b
SHA256012d95466a34a79fa20a07227e14aff48e543a01ac1aab07d04542cd76889fab
SHA51253aaceae549b80a726060f6c16b4a0c3f1ad44e2a3775b3f509c445c2decaf9c76b3523ace422f27df6297f5744e192fa9681834d95d9c480367d1f4424261a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\85df4de9-b044-43af-8b08-27f4ecb8686b
Filesize745B
MD53de94a4358ea77342093e077eec7f031
SHA1c83fbc571f0b2e8fa239e413f13d7c5e25bef979
SHA256c0454be11494aa729e836c4c158407dc658a12beedbad75df6da581cfb018f26
SHA5129d5ed233ece887f6f52193550fbf363f0a1623dda6866b15d8f7415cf98aca774e98f568dbe8a405e3773604f8f0ba72795826de980b727c85cafde5f2fa97b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\c78347b8-5c10-41bc-809a-0dbbd2d49924
Filesize10KB
MD57d06df8bd52e5dd14e1258a14db93ecb
SHA1e8f9145dc8b87773e220ba98b14e830687b051e7
SHA256bccb6383ffce926ef62e0707fc51f9d7b836affa7bc5f2d4c0a26d6e098e9b28
SHA512c6ebb12d8565cf6194d4863f82c7a045082b1428da6d2f3523f14ef6eb9210451ef058ef70ba88f0ba2891c99360068e80c6bfef995f7f520a8155daee8f293b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD567cbb5502331291c4317a0e6279a0e99
SHA196f21df5f525d7c96cab0243567d0ac47a070d76
SHA256eedfeb24f497d42b09dd76f059aedc27fbea27a33e53b3fdb79ccbd59010c1bb
SHA512ad476a00bfa6504efd7c81e33ea5f6d204f74659a8ed7bdfb437822362a864729603c1d9433e7186faf0bdf1c7a6ab3f94ca9ba0d79bd5fce5d68f6d85e51d36
-
Filesize
7KB
MD5a853e1b6917bdef698e3f570a62b5d06
SHA18640d1dd114f5ce15946c7447dbab3b8fd2e1b34
SHA256f30c1a7abf9e9b4df9cc1d365e721f2876b4073820220bf83612eef1e5b50069
SHA512861e0095653c443cfb69ffc242966048c60fac499ec624209ffced59f56acc997aa11f58fdd55ab426c7c8f0b486b19def0d534bc5e39c88543a73585d5815a6
-
Filesize
6KB
MD5313d5eb904c9371af3deacfc56a403a9
SHA14fc2a716334b777cdfd030e426d43f347b9417a0
SHA256802984b1f2d4a2a332ae7b445ec94d481080df92e4226cc149692ad7d677069f
SHA512842ec615a22fd15684d84c330d6d72c9d3357eaae1a8cbbab4b34fc24ea5f6d51561f6ab2f2c29818af6114cebcd102c5f46e5c038701e7c62ae1c561a05ccbd
-
Filesize
6KB
MD5b04f1568a8318d2e3e3e369a9cd0c497
SHA1ec0f1ec3c298e9e0a6ce5500b934efc1c54b5ab9
SHA2561d1f6c0015f6266160a299332c15b3f500f0df3efd496e1213e00fb0288850e7
SHA51232df3dfa1a360d55746915d3cee4febc745112cdf9101febbb6cec6a1b97d523c76753fda25453608bcca2eaa64e881f13f00b0676830ef2201eebdb5f2528d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5f8cec15dd2dd8c845d0358255cb048ea
SHA19d3f73d2c0c6b5e8406bb694594c91675553e3c0
SHA2563293a15a0a8af94ee9ac1810f6aa247b377ada789f5730695eab4e7ee5702298
SHA51232deda7b1e7348a99c3ccb508ea10c01fc0c7c54293b9e5b77d96bf80bf0ebd6670d5e683693e0434b31fd3dee1d429ce3f4596aab59045fae489ef6f2335e5c