Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe
Resource
win7-20240903-en
General
-
Target
335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe
-
Size
1.8MB
-
MD5
57a7e9c590d8ff6b38207e958af66ce7
-
SHA1
ccddf028f19124a282248d55536e806f1a690065
-
SHA256
335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a
-
SHA512
9e29855aebf2e4de04da0ad80fa7fcdbc2077fd9ec1d588715fe033b6e012382396ce4fcd9cf9b55b34a47b94d098d31ced4760af067ae9f897a672adb3ab3a2
-
SSDEEP
24576:ndHes/0ilmQyphHvEGJ7YHxJyqrEq+KK/RxVKaFymJQPa/u0ro9Wh/VRGjm/ebpT:5es/zlmDphPtsTyqGK2Ka/riWtVv8g
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://hallowed-noisy.sbs/api
https://plastic-mitten.sbs/api
https://slam-whipp.sbs/api
https://record-envyp.sbs/api
https://copper-replace.sbs/api
https://savvy-steereo.sbs/api
https://preside-comforter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5171efc5d5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 5171efc5d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5171efc5d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5171efc5d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5171efc5d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5171efc5d5.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 1799d0338f.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3bb8eceb68.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5171efc5d5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1799d0338f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d17a9d89b6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 31300a92a6.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d17a9d89b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 31300a92a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5171efc5d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d17a9d89b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5171efc5d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1799d0338f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1799d0338f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 31300a92a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3bb8eceb68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3bb8eceb68.exe -
Executes dropped EXE 7 IoCs
pid Process 2804 skotes.exe 2036 1799d0338f.exe 2536 d17a9d89b6.exe 912 31300a92a6.exe 2756 3bb8eceb68.exe 1900 8696277fc8.exe 3684 5171efc5d5.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine d17a9d89b6.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 31300a92a6.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 3bb8eceb68.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 5171efc5d5.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 1799d0338f.exe -
Loads dropped DLL 9 IoCs
pid Process 3064 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe 3064 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2536 d17a9d89b6.exe 2804 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 5171efc5d5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5171efc5d5.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\31300a92a6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009696001\\31300a92a6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\3bb8eceb68.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009697001\\3bb8eceb68.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\8696277fc8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009698001\\8696277fc8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\5171efc5d5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009699001\\5171efc5d5.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001743a-132.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3064 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe 2804 skotes.exe 2036 1799d0338f.exe 2536 d17a9d89b6.exe 912 31300a92a6.exe 2756 3bb8eceb68.exe 3684 5171efc5d5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5171efc5d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1799d0338f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31300a92a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d17a9d89b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bb8eceb68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8696277fc8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2664 taskkill.exe 352 taskkill.exe 604 taskkill.exe 1792 taskkill.exe 2704 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 31300a92a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 31300a92a6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 31300a92a6.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3064 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe 2804 skotes.exe 2036 1799d0338f.exe 2036 1799d0338f.exe 2036 1799d0338f.exe 2036 1799d0338f.exe 2036 1799d0338f.exe 2036 1799d0338f.exe 2536 d17a9d89b6.exe 912 31300a92a6.exe 2756 3bb8eceb68.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 3684 5171efc5d5.exe 3684 5171efc5d5.exe 3684 5171efc5d5.exe 3684 5171efc5d5.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2664 taskkill.exe Token: SeDebugPrivilege 352 taskkill.exe Token: SeDebugPrivilege 604 taskkill.exe Token: SeDebugPrivilege 1792 taskkill.exe Token: SeDebugPrivilege 2704 taskkill.exe Token: SeDebugPrivilege 2176 firefox.exe Token: SeDebugPrivilege 2176 firefox.exe Token: SeDebugPrivilege 3684 5171efc5d5.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 3064 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 2176 firefox.exe 2176 firefox.exe 2176 firefox.exe 2176 firefox.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 2176 firefox.exe 2176 firefox.exe 2176 firefox.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe 1900 8696277fc8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2804 3064 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe 30 PID 3064 wrote to memory of 2804 3064 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe 30 PID 3064 wrote to memory of 2804 3064 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe 30 PID 3064 wrote to memory of 2804 3064 335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe 30 PID 2804 wrote to memory of 2036 2804 skotes.exe 33 PID 2804 wrote to memory of 2036 2804 skotes.exe 33 PID 2804 wrote to memory of 2036 2804 skotes.exe 33 PID 2804 wrote to memory of 2036 2804 skotes.exe 33 PID 2804 wrote to memory of 2536 2804 skotes.exe 34 PID 2804 wrote to memory of 2536 2804 skotes.exe 34 PID 2804 wrote to memory of 2536 2804 skotes.exe 34 PID 2804 wrote to memory of 2536 2804 skotes.exe 34 PID 2804 wrote to memory of 912 2804 skotes.exe 36 PID 2804 wrote to memory of 912 2804 skotes.exe 36 PID 2804 wrote to memory of 912 2804 skotes.exe 36 PID 2804 wrote to memory of 912 2804 skotes.exe 36 PID 2804 wrote to memory of 2756 2804 skotes.exe 37 PID 2804 wrote to memory of 2756 2804 skotes.exe 37 PID 2804 wrote to memory of 2756 2804 skotes.exe 37 PID 2804 wrote to memory of 2756 2804 skotes.exe 37 PID 2804 wrote to memory of 1900 2804 skotes.exe 38 PID 2804 wrote to memory of 1900 2804 skotes.exe 38 PID 2804 wrote to memory of 1900 2804 skotes.exe 38 PID 2804 wrote to memory of 1900 2804 skotes.exe 38 PID 1900 wrote to memory of 2664 1900 8696277fc8.exe 39 PID 1900 wrote to memory of 2664 1900 8696277fc8.exe 39 PID 1900 wrote to memory of 2664 1900 8696277fc8.exe 39 PID 1900 wrote to memory of 2664 1900 8696277fc8.exe 39 PID 1900 wrote to memory of 352 1900 8696277fc8.exe 42 PID 1900 wrote to memory of 352 1900 8696277fc8.exe 42 PID 1900 wrote to memory of 352 1900 8696277fc8.exe 42 PID 1900 wrote to memory of 352 1900 8696277fc8.exe 42 PID 1900 wrote to memory of 604 1900 8696277fc8.exe 44 PID 1900 wrote to memory of 604 1900 8696277fc8.exe 44 PID 1900 wrote to memory of 604 1900 8696277fc8.exe 44 PID 1900 wrote to memory of 604 1900 8696277fc8.exe 44 PID 1900 wrote to memory of 1792 1900 8696277fc8.exe 46 PID 1900 wrote to memory of 1792 1900 8696277fc8.exe 46 PID 1900 wrote to memory of 1792 1900 8696277fc8.exe 46 PID 1900 wrote to memory of 1792 1900 8696277fc8.exe 46 PID 1900 wrote to memory of 2704 1900 8696277fc8.exe 48 PID 1900 wrote to memory of 2704 1900 8696277fc8.exe 48 PID 1900 wrote to memory of 2704 1900 8696277fc8.exe 48 PID 1900 wrote to memory of 2704 1900 8696277fc8.exe 48 PID 1900 wrote to memory of 2992 1900 8696277fc8.exe 50 PID 1900 wrote to memory of 2992 1900 8696277fc8.exe 50 PID 1900 wrote to memory of 2992 1900 8696277fc8.exe 50 PID 1900 wrote to memory of 2992 1900 8696277fc8.exe 50 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2992 wrote to memory of 2176 2992 firefox.exe 51 PID 2176 wrote to memory of 2204 2176 firefox.exe 52 PID 2176 wrote to memory of 2204 2176 firefox.exe 52 PID 2176 wrote to memory of 2204 2176 firefox.exe 52 PID 2176 wrote to memory of 988 2176 firefox.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe"C:\Users\Admin\AppData\Local\Temp\335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\1009690001\1799d0338f.exe"C:\Users\Admin\AppData\Local\Temp\1009690001\1799d0338f.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\1009691001\d17a9d89b6.exe"C:\Users\Admin\AppData\Local\Temp\1009691001\d17a9d89b6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\1009696001\31300a92a6.exe"C:\Users\Admin\AppData\Local\Temp\1009696001\31300a92a6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\1009697001\3bb8eceb68.exe"C:\Users\Admin\AppData\Local\Temp\1009697001\3bb8eceb68.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\1009698001\8696277fc8.exe"C:\Users\Admin\AppData\Local\Temp\1009698001\8696277fc8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.0.111057248\1690635639" -parentBuildID 20221007134813 -prefsHandle 1204 -prefMapHandle 1176 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {61e460ff-e83f-477c-8dc7-d9bf4ccaad76} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 1284 44f8358 gpu6⤵PID:2204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.1.1158355902\567963043" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {808beaf1-90e8-4175-b7eb-093d3ae7899d} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 1500 43fc258 socket6⤵PID:988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.2.1218653442\1816116778" -childID 1 -isForBrowser -prefsHandle 2100 -prefMapHandle 2096 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f93f0355-68b8-418a-b9ad-fe92998a7d62} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 2116 445c058 tab6⤵PID:2780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.3.467672177\423251772" -childID 2 -isForBrowser -prefsHandle 2852 -prefMapHandle 2848 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {33af7e16-37a9-4784-8682-115971d8a437} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 2864 1b2b4258 tab6⤵PID:708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.4.53605783\1724961219" -childID 3 -isForBrowser -prefsHandle 3120 -prefMapHandle 3736 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc34e3dc-c4e0-4554-934c-b50df3652af2} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 3364 1e8dce58 tab6⤵PID:576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.5.2004069184\1405076908" -childID 4 -isForBrowser -prefsHandle 3852 -prefMapHandle 3856 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a52ac158-63a3-4ae7-8e24-f4e2cebdfcac} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 3844 1e8dda58 tab6⤵PID:1932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.6.1472713335\3515340" -childID 5 -isForBrowser -prefsHandle 4016 -prefMapHandle 4020 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1c87c1e-8ab1-49dc-8e42-7c126abd6161} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 4008 1e8de658 tab6⤵PID:1920
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009699001\5171efc5d5.exe"C:\Users\Admin\AppData\Local\Temp\1009699001\5171efc5d5.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5d50c675ffc90fc792d3513a440ca8364
SHA1297d90ac584dea34abeab986b427ff21a5092c36
SHA256dbf5b40736638a5cf9867ca862ea171a16bbfdb320e0f45db64b492b9693e8a5
SHA512a38a2a0f8e663543e32afaf77e6517de049eb1043258f04efcdaa170334730e8c8c2046f60b948d870bb225c076e2498d24a77d86d127806e63acaea292312f3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
4.3MB
MD570647ec5c04eaafb04b3319a7e0b1d67
SHA116a45cb01b76d4a81000fdaa9b1a75b7d2e6ec44
SHA25637125e305ba7aaf98800a69466f688c52b53ad4f3c5f5d9d539f4b6711a13a23
SHA512095025eecbfd5af29106384b3a6994830de3e43e54ec9486c75afc122557d15ee71c7ae9036d7945e3320d12573e98bc489dc5276ef7c5a59a788124612e1334
-
Filesize
1.9MB
MD5885e6fcd0b6139ddb438d6db924465e4
SHA141aef5b16d0bf65a18779a0171c093bf19ab2d76
SHA256005c6b318c758f7e6f3177d07ef6e4e4b30ff2109e44534cd7b17340549d6e94
SHA51282257aa2f61bebfb04e85754727301075007ede1b8bb642ac4a8df81a3217a1f62a0af426ae8e51dab1d61d0d04d382799e2c04add35c0137c97e4b598d2ceb0
-
Filesize
1.8MB
MD5ca2dc496921dfa6d820965aed52ac22f
SHA1bc8b6a329115427948ec20fb19677a55aca8a5de
SHA2566461bbb8e66cc5c1ccd64c8dd490469db933e706fc31e0d4e04169ce1c8eac6b
SHA5127257dcaa09a8945244d77656e15cf70f083ce762b539bb3e705213eed7d7f4ef5d7eec33d62a13e5b8346616f7a00032b44478e4dbddf567a3fad1ea813145fb
-
Filesize
1.7MB
MD52161542fb1d2a63c5ab31b5ef29c0131
SHA1a65457c4affa754db6437b37d5994c15bcf373f7
SHA256fc8990a331ff3c5cfdd808147ceed0246caece6227a157a746334479bf173d02
SHA5129a1bd758a542cb7a906a1b8f4f69fa3a4f2ba3ac8c05d0309f87b98a7630b17257790aa2be695dff31a0ad76c4f87a74b7f64b166d81e1aefe4d6c7a9fd4378a
-
Filesize
901KB
MD5c46fc38943ce9922c5ce966028bac827
SHA13b36911c6e966906d3c8fac7b9c6e6a760c5009c
SHA256f938770d4b1772562863ee073180d244671c47b0192a593210cecc37f12e6fa5
SHA5127b70422cde117b763e80be942aa552def58362714c2c800bf7c2018eef6aaae12f2ae8fed2022cb8c25e265a087e353a1eeb5518d8b4f37e6d09fd2f23d2a7fd
-
Filesize
2.7MB
MD56bd4139dd64e984531afe4676499641a
SHA142891ee5f9fc5aba24798481b7a7416e5d9d761d
SHA256740f22095fb7b8a51f99405f200288f00a61c0ebb60e4583a49b4453b2b9ca75
SHA512ff33df264a3bd4f8e81c8ba0f8b2a12b5e30fa86231cde521b2bb00b419559824415e69a406b46bae6b8de56c2b1af78e74f43474c29a2bb587a5b514dc234af
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD557a7e9c590d8ff6b38207e958af66ce7
SHA1ccddf028f19124a282248d55536e806f1a690065
SHA256335eb4b61525323fee45b58473d2112f063afb36bb98beda28b832925d03de9a
SHA5129e29855aebf2e4de04da0ad80fa7fcdbc2077fd9ec1d588715fe033b6e012382396ce4fcd9cf9b55b34a47b94d098d31ced4760af067ae9f897a672adb3ab3a2
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5268f95888827b0059f8ce38c4cbf704c
SHA159ece565e9c5ad68f3a62d87c23a963a7a5ebaf7
SHA25629a727054e0bdc7f4b7c70b7a0d0f54995b5fdd8f90e618af751e213e055985b
SHA51229393ee2c9ae535aa9e97dbeafc708d6c0b0ce5b38e17223a351c0a6820a042e8160a0fe6ac14f498680e7c8cc9f435896699973dbd56b267ec68955c6723032
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\71a4e6bf-e8d2-4867-9e9d-1e9c9290e21c
Filesize745B
MD5ec74071ae52d8a82d4084d6abd30d1cc
SHA199d3350b01112743532b5b407beade078db10744
SHA256a01cd5156763007e264a76a66011dd0a22806121cfd6584d312de8c3cb93fc1c
SHA512479f7d4d5d4fc8e5df4ff88a2e09a293b72ec50f819385f3f53070955f01f958b348111ecda5d8ac1950ba5b49414e7a59802d201cb88e83338a2be2d8801d0a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\79d1739a-84f2-414e-a44d-b089826b7480
Filesize12KB
MD5f095ff658404c4f22b9312a85fc609d0
SHA188a438671150f8576a4b09c03f6862bc170e85b2
SHA25644ff00e4d5708c43f84408442fe7a8f666fc49c58419d8b2bb0138430b3eafab
SHA512edc475e87cf4353edf5b0b066fa6affcfbc1aa084a3d18bf51a9abb03ba00a8a5f134e868a0d460e7a94cd185e2b5754e15c7c4470da7e23c35cde70c9245c89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5f89f1e557cd67ec02063ef97b0024ca4
SHA15dc36213c979d854f35d0a85089bee768a9d71f4
SHA256383dbf0278b354ffa0c4a2fc49620ab348d49a3d831474749734c48b6eb8a6c5
SHA51270136af93e059e748f8fb8774743e7eccd8172c95ba899056c807dabb104b13e4678a9249b1cb86494121b51694c4159c4a75375f1f0d81434e58691045ec617
-
Filesize
7KB
MD58b3af691cc1abbb7eff63261e83651ee
SHA1f84af0397b8b659f617061eae6cb2dc51e55a3c7
SHA256128ac4700dc2dc917651c9ec327383f17bf0b790322d7227a61169d9891290dc
SHA5122baccd1745ad547141d4af93ae1fbdf1f078c71c71dd51d5e5106930d652582f1536d83a36ab61f297668f17ee37d7306973043441b8e40f208725dfb4efa463
-
Filesize
6KB
MD5cfc7bccc7211430e005a57240367e913
SHA1c172d007c02285675b69016940c95e87da322d35
SHA2565325d92bd00ed75c38e8257440adcf890de5d4d6a07d546ba0b2b02302641ad2
SHA512d54e7ff202c0f713ef044bda0e4ecda72f070eb35a8c0fd601b8918f4f69e695d23a4b02318a44741c078535d7a30f77f703db959e63b90c4c4ef28c05ff998d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD545933610a95c7ba781de53e7c4f6e0fc
SHA1194a52ace19ab338912b86803e5cf6fe5fefc346
SHA25654674bffb13b78feeb87c35dfdd43883acf8996ec651757e1dfc35cf6fb75d20
SHA51217ddb17d4f91aecc31b0bdc183d14eb128bc4234b70611f77b48aa5b7dec89791c51da04c011175460fbc3e3b34485d3bdff3b740a8e98c469e2486679cad911
-
Filesize
1.4MB
MD5a8cf5621811f7fac55cfe8cb3fa6b9f6
SHA1121356839e8138a03141f5f5856936a85bd2a474
SHA256614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c
SHA5124479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd