Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
13129974d7447f2f74f8377260f5bf82.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13129974d7447f2f74f8377260f5bf82.exe
Resource
win10v2004-20250217-en
General
-
Target
13129974d7447f2f74f8377260f5bf82.exe
-
Size
1.8MB
-
MD5
13129974d7447f2f74f8377260f5bf82
-
SHA1
897d9332ace7d3eea31e98563562f2b61fb871d7
-
SHA256
baf0e2efe3d441c4631b40d199edd05b56b49620f60bfd03ece1012fde47b30c
-
SHA512
3a3617e221ff0f95ade28b9329b6b05898d3fd2464e352c36746cfabcd503c16896f0712d7ebccb482888adb4da4aa6d0ef5bf5c1197f107a47b8ea1896be54b
-
SSDEEP
24576:pvAqwosjHFzTcnKZqTuFtsPpOPKKHQXCM//TwKo9V3Ehvty5wqHeKkfahq2:WpomlsnAqicPpgKfSLxX2vc5CfahV
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://begindecafer.world/api
https://9garagedrootz.top/api
https://modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://ksterpickced.digital/api
https://xexarthynature.run/api
https://hardswarehub.today/api
https://gadgethgfub.icu/api
https://shardrwarehaven.run/api
https://techmindzs.live/api
https://bcodxefusion.top/api
https://quietswtreams.life/api
https://techspherxe.top/api
https://earthsymphzony.today/api
https://dawtastream.bet/api
https://foresctwhispers.top/api
https://tracnquilforest.life/api
https://xcollapimga.fun/api
https://strawpeasaen.fun/api
https://jquietswtreams.life/api
https://starrynsightsky.icu/api
https://defaulemot.run/api
https://sterpickced.digital/api
https://circujitstorm.bet/api
https://explorebieology.run/api
https://moderzysics.top/api
https://codxefusion.top/api
https://phygcsforum.life/api
https://utechspherxe.top/api
https://agroecologyguide.digital/api
https://kmoderzysics.top/api
https://seedsxouts.shop/api
https://rcodxefusion.top/api
https://farfinable.top/api
https://cropcircleforum.today/api
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
lumma
https://exarthynature.run/api
https://moderzysics.top/api
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/2980-460-0x0000000000340000-0x00000000005F8000-memory.dmp healer behavioral1/memory/2980-461-0x0000000000340000-0x00000000005F8000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 87a504ae61.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 87a504ae61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 87a504ae61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 87a504ae61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 87a504ae61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 87a504ae61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 87a504ae61.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 87a504ae61.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 87a504ae61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 87a504ae61.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1279735e94.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ee13c2b96e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ecdc345473.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0d49a3b977.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e2b1ddb355.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 87a504ae61.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 13129974d7447f2f74f8377260f5bf82.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c816e942e2.exe -
Downloads MZ/PE file 13 IoCs
flow pid Process 8 2912 rapes.exe 8 2912 rapes.exe 8 2912 rapes.exe 8 2912 rapes.exe 8 2912 rapes.exe 8 2912 rapes.exe 8 2912 rapes.exe 8 2912 rapes.exe 8 2912 rapes.exe 8 2912 rapes.exe 10 944 BitLockerToGo.exe 27 2496 BitLockerToGo.exe 5 2912 rapes.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0d49a3b977.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e2b1ddb355.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c816e942e2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 87a504ae61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1279735e94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1279735e94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ee13c2b96e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ecdc345473.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c816e942e2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 13129974d7447f2f74f8377260f5bf82.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ecdc345473.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0d49a3b977.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 87a504ae61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e2b1ddb355.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 13129974d7447f2f74f8377260f5bf82.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ee13c2b96e.exe -
Executes dropped EXE 15 IoCs
pid Process 2912 rapes.exe 2532 1279735e94.exe 2988 ee13c2b96e.exe 2176 ecdc345473.exe 2288 0d49a3b977.exe 2736 d55158c28f.exe 2544 d55158c28f.exe 2668 e2b1ddb355.exe 2524 c816e942e2.exe 1804 c379d3025a.exe 2980 87a504ae61.exe 1392 zY9sqWs.exe 2584 MCxU5Fj.exe 2936 MCxU5Fj.exe 3480 9hUDDVk.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 13129974d7447f2f74f8377260f5bf82.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 0d49a3b977.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine e2b1ddb355.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine c816e942e2.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 87a504ae61.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 1279735e94.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ee13c2b96e.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ecdc345473.exe -
Loads dropped DLL 60 IoCs
pid Process 1628 13129974d7447f2f74f8377260f5bf82.exe 1628 13129974d7447f2f74f8377260f5bf82.exe 2912 rapes.exe 2912 rapes.exe 2000 WerFault.exe 2000 WerFault.exe 2000 WerFault.exe 2912 rapes.exe 2912 rapes.exe 2912 rapes.exe 2912 rapes.exe 2912 rapes.exe 2912 rapes.exe 2912 rapes.exe 2736 d55158c28f.exe 1524 WerFault.exe 1524 WerFault.exe 1524 WerFault.exe 1524 WerFault.exe 1524 WerFault.exe 1688 WerFault.exe 1688 WerFault.exe 1688 WerFault.exe 1688 WerFault.exe 1688 WerFault.exe 944 BitLockerToGo.exe 2912 rapes.exe 2912 rapes.exe 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe 2912 rapes.exe 2912 rapes.exe 2912 rapes.exe 2912 rapes.exe 2912 rapes.exe 2496 BitLockerToGo.exe 2912 rapes.exe 2912 rapes.exe 2912 rapes.exe 2584 MCxU5Fj.exe 2844 WerFault.exe 2844 WerFault.exe 2844 WerFault.exe 2844 WerFault.exe 2844 WerFault.exe 3168 WerFault.exe 3168 WerFault.exe 3168 WerFault.exe 3168 WerFault.exe 3168 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 2912 rapes.exe 3920 WerFault.exe 3920 WerFault.exe 3920 WerFault.exe 3920 WerFault.exe 3920 WerFault.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 87a504ae61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 87a504ae61.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\e2b1ddb355.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10126380101\\e2b1ddb355.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\c816e942e2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10126390101\\c816e942e2.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\c379d3025a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10126400101\\c379d3025a.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\87a504ae61.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10126410101\\87a504ae61.exe" rapes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000019275-288.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1628 13129974d7447f2f74f8377260f5bf82.exe 2912 rapes.exe 2532 1279735e94.exe 2988 ee13c2b96e.exe 2176 ecdc345473.exe 2288 0d49a3b977.exe 2668 e2b1ddb355.exe 2524 c816e942e2.exe 2980 87a504ae61.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2988 set thread context of 944 2988 ee13c2b96e.exe 36 PID 2176 set thread context of 2496 2176 ecdc345473.exe 41 PID 2736 set thread context of 2544 2736 d55158c28f.exe 42 PID 2584 set thread context of 2936 2584 MCxU5Fj.exe 73 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 13129974d7447f2f74f8377260f5bf82.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2000 2532 WerFault.exe 30 1524 2736 WerFault.exe 40 1688 2544 WerFault.exe 42 2276 2668 WerFault.exe 47 2844 2584 WerFault.exe 72 3168 2936 WerFault.exe 73 3264 1392 WerFault.exe 71 3920 3480 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee13c2b96e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d55158c28f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2b1ddb355.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87a504ae61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9hUDDVk.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage c379d3025a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d55158c28f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c379d3025a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdc345473.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d49a3b977.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language c379d3025a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13129974d7447f2f74f8377260f5bf82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1279735e94.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2672 taskkill.exe 2804 taskkill.exe 2384 taskkill.exe 2976 taskkill.exe 1920 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 e2b1ddb355.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 e2b1ddb355.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 e2b1ddb355.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1628 13129974d7447f2f74f8377260f5bf82.exe 2912 rapes.exe 2532 1279735e94.exe 2988 ee13c2b96e.exe 2176 ecdc345473.exe 2288 0d49a3b977.exe 2668 e2b1ddb355.exe 2524 c816e942e2.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 2980 87a504ae61.exe 2980 87a504ae61.exe 2980 87a504ae61.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2736 d55158c28f.exe Token: SeDebugPrivilege 2976 taskkill.exe Token: SeDebugPrivilege 1920 taskkill.exe Token: SeDebugPrivilege 2672 taskkill.exe Token: SeDebugPrivilege 2804 taskkill.exe Token: SeDebugPrivilege 2384 taskkill.exe Token: SeDebugPrivilege 2660 firefox.exe Token: SeDebugPrivilege 2660 firefox.exe Token: SeDebugPrivilege 2980 87a504ae61.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1628 13129974d7447f2f74f8377260f5bf82.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 2660 firefox.exe 2660 firefox.exe 2660 firefox.exe 2660 firefox.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 2660 firefox.exe 2660 firefox.exe 2660 firefox.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe 1804 c379d3025a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2912 1628 13129974d7447f2f74f8377260f5bf82.exe 28 PID 1628 wrote to memory of 2912 1628 13129974d7447f2f74f8377260f5bf82.exe 28 PID 1628 wrote to memory of 2912 1628 13129974d7447f2f74f8377260f5bf82.exe 28 PID 1628 wrote to memory of 2912 1628 13129974d7447f2f74f8377260f5bf82.exe 28 PID 2912 wrote to memory of 2532 2912 rapes.exe 30 PID 2912 wrote to memory of 2532 2912 rapes.exe 30 PID 2912 wrote to memory of 2532 2912 rapes.exe 30 PID 2912 wrote to memory of 2532 2912 rapes.exe 30 PID 2532 wrote to memory of 2000 2532 1279735e94.exe 32 PID 2532 wrote to memory of 2000 2532 1279735e94.exe 32 PID 2532 wrote to memory of 2000 2532 1279735e94.exe 32 PID 2532 wrote to memory of 2000 2532 1279735e94.exe 32 PID 2912 wrote to memory of 2988 2912 rapes.exe 35 PID 2912 wrote to memory of 2988 2912 rapes.exe 35 PID 2912 wrote to memory of 2988 2912 rapes.exe 35 PID 2912 wrote to memory of 2988 2912 rapes.exe 35 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2988 wrote to memory of 944 2988 ee13c2b96e.exe 36 PID 2912 wrote to memory of 2176 2912 rapes.exe 38 PID 2912 wrote to memory of 2176 2912 rapes.exe 38 PID 2912 wrote to memory of 2176 2912 rapes.exe 38 PID 2912 wrote to memory of 2176 2912 rapes.exe 38 PID 2912 wrote to memory of 2288 2912 rapes.exe 39 PID 2912 wrote to memory of 2288 2912 rapes.exe 39 PID 2912 wrote to memory of 2288 2912 rapes.exe 39 PID 2912 wrote to memory of 2288 2912 rapes.exe 39 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2912 wrote to memory of 2736 2912 rapes.exe 40 PID 2912 wrote to memory of 2736 2912 rapes.exe 40 PID 2912 wrote to memory of 2736 2912 rapes.exe 40 PID 2912 wrote to memory of 2736 2912 rapes.exe 40 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2176 wrote to memory of 2496 2176 ecdc345473.exe 41 PID 2736 wrote to memory of 2544 2736 d55158c28f.exe 42 PID 2736 wrote to memory of 2544 2736 d55158c28f.exe 42 PID 2736 wrote to memory of 2544 2736 d55158c28f.exe 42 PID 2736 wrote to memory of 2544 2736 d55158c28f.exe 42 PID 2736 wrote to memory of 2544 2736 d55158c28f.exe 42 PID 2736 wrote to memory of 2544 2736 d55158c28f.exe 42 PID 2736 wrote to memory of 2544 2736 d55158c28f.exe 42 PID 2736 wrote to memory of 2544 2736 d55158c28f.exe 42 PID 2736 wrote to memory of 2544 2736 d55158c28f.exe 42 PID 2736 wrote to memory of 2544 2736 d55158c28f.exe 42 PID 2736 wrote to memory of 1524 2736 d55158c28f.exe 43 PID 2736 wrote to memory of 1524 2736 d55158c28f.exe 43 PID 2736 wrote to memory of 1524 2736 d55158c28f.exe 43 PID 2736 wrote to memory of 1524 2736 d55158c28f.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\13129974d7447f2f74f8377260f5bf82.exe"C:\Users\Admin\AppData\Local\Temp\13129974d7447f2f74f8377260f5bf82.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\10126330101\1279735e94.exe"C:\Users\Admin\AppData\Local\Temp\10126330101\1279735e94.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 12044⤵
- Loads dropped DLL
- Program crash
PID:2000
-
-
-
C:\Users\Admin\AppData\Local\Temp\10126340101\ee13c2b96e.exe"C:\Users\Admin\AppData\Local\Temp\10126340101\ee13c2b96e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:944
-
-
-
C:\Users\Admin\AppData\Local\Temp\10126350101\ecdc345473.exe"C:\Users\Admin\AppData\Local\Temp\10126350101\ecdc345473.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\10126360101\0d49a3b977.exe"C:\Users\Admin\AppData\Local\Temp\10126360101\0d49a3b977.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\10126370101\d55158c28f.exe"C:\Users\Admin\AppData\Local\Temp\10126370101\d55158c28f.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\10126370101\d55158c28f.exe"C:\Users\Admin\AppData\Local\Temp\10126370101\d55158c28f.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 10125⤵
- Loads dropped DLL
- Program crash
PID:1688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 5084⤵
- Loads dropped DLL
- Program crash
PID:1524
-
-
-
C:\Users\Admin\AppData\Local\Temp\10126380101\e2b1ddb355.exe"C:\Users\Admin\AppData\Local\Temp\10126380101\e2b1ddb355.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 12004⤵
- Loads dropped DLL
- Program crash
PID:2276
-
-
-
C:\Users\Admin\AppData\Local\Temp\10126390101\c816e942e2.exe"C:\Users\Admin\AppData\Local\Temp\10126390101\c816e942e2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\10126400101\c379d3025a.exe"C:\Users\Admin\AppData\Local\Temp\10126400101\c379d3025a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1804 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2468
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2660 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2660.0.1620287618\111508271" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {63b4cc6d-b915-4d08-aa2e-8f3c8a81d540} 2660 "\\.\pipe\gecko-crash-server-pipe.2660" 1284 111f7b58 gpu6⤵PID:2764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2660.1.1132673085\75588454" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {17f5ecd5-048e-4b02-9b17-531cd390b430} 2660 "\\.\pipe\gecko-crash-server-pipe.2660" 1500 d72d58 socket6⤵PID:1780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2660.2.295896686\2090209149" -childID 1 -isForBrowser -prefsHandle 2044 -prefMapHandle 2040 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {da249eeb-10e4-4e04-ae3f-4794ac9ef647} 2660 "\\.\pipe\gecko-crash-server-pipe.2660" 2060 19fc8e58 tab6⤵PID:2128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2660.3.447049613\1941300777" -childID 2 -isForBrowser -prefsHandle 2820 -prefMapHandle 2816 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {83926be7-8975-4bbd-8ce3-24dd3c0e1f74} 2660 "\\.\pipe\gecko-crash-server-pipe.2660" 2832 1ccb0258 tab6⤵PID:1728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2660.4.1152559632\1004421765" -childID 3 -isForBrowser -prefsHandle 3756 -prefMapHandle 3752 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {59316948-453a-44b0-82e4-3e874392ef6f} 2660 "\\.\pipe\gecko-crash-server-pipe.2660" 3768 21753e58 tab6⤵PID:2680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2660.5.880180136\926361629" -childID 4 -isForBrowser -prefsHandle 3876 -prefMapHandle 3880 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f872100f-ea5f-4683-b8dc-296489f34edb} 2660 "\\.\pipe\gecko-crash-server-pipe.2660" 3864 21754458 tab6⤵PID:2228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2660.6.1694291529\1578277062" -childID 5 -isForBrowser -prefsHandle 4048 -prefMapHandle 4052 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb193b08-43d8-4652-b216-74781a175dae} 2660 "\\.\pipe\gecko-crash-server-pipe.2660" 4036 21814f58 tab6⤵PID:1916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10126410101\87a504ae61.exe"C:\Users\Admin\AppData\Local\Temp\10126410101\87a504ae61.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\10126420101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10126420101\zY9sqWs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 10084⤵
- Loads dropped DLL
- Program crash
PID:3264
-
-
-
C:\Users\Admin\AppData\Local\Temp\10126430101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10126430101\MCxU5Fj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\10126430101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10126430101\MCxU5Fj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 10085⤵
- Loads dropped DLL
- Program crash
PID:3168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 5044⤵
- Loads dropped DLL
- Program crash
PID:2844
-
-
-
C:\Users\Admin\AppData\Local\Temp\10126440101\9hUDDVk.exe"C:\Users\Admin\AppData\Local\Temp\10126440101\9hUDDVk.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 8364⤵
- Loads dropped DLL
- Program crash
PID:3920
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5bf6cef58817e45edbf3c71a09a9edc64
SHA149f57fa51c2f3e3d1707b54ac0a44cb239b304f9
SHA2567b10491748c9782804080f9786e80b4e5d85d5506329c1d8f59f8ae050a93e5c
SHA512c7da20eb74ddb63e49312f54a92c82a33495d689194775ab84562642eca6e53a1bfadac881aa4c43bd5bd4c16632ec6ffecb80f4464ccf788345a95aefbe54b8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.9MB
MD57ef195119136bbd7338323363639b91b
SHA1ef751fa464c872ddfb94e530578ae2d5575ea0ab
SHA25676f4434753e13ea20f59819a07b45b0b17ca3d01a0b7f403a936178ae8d95d58
SHA51238d2b6cbf352a95d11888707f8ae8d13e6fe6073b495a29814aa8cc689fdb585c0287a1ce4bee2a8226e23ee07c455f4cfd8a3399c48961a5ebf71501032d8b8
-
Filesize
3.7MB
MD5816d3fd07925e02b1d0cde9f2d96c6d5
SHA1f3859dc7db085a483897faff2604b28230c4e8f3
SHA2565a02669e795145ac1c89e49db386b85534c5b34b804f053a14c8ba2401ddc5d0
SHA512a805f1bb9de30ae1be60600615b6c9692ff13f7ab85bb03c8463aa3bd963b1ef5cfe4b50ebed44d7346d7e57a95e7f55245c6cd38480b91475e48cbb8667063e
-
Filesize
4.5MB
MD5f23cde620e1aa927df2729ab5bc026ba
SHA117a28874ec64756b561f6bff36a9ce15bc86e023
SHA256979d7afda8224f12d4fbf3baf313d34317869d30e52608fe3e2f959fa2998b49
SHA51248e7969a0a10d42d92e13a16d86ca653201a5a6456adf1640f323a805d5e088ff50cca60fed50560c05df83913d513ec7ae7119e11883c4360ba46294a73e810
-
Filesize
1.8MB
MD58ff477ff742577c058d141727a10c360
SHA1caf8d13255ca0e7d4b44fa9bb84d7818e4ae6174
SHA256e3d97d7041d8c959ce04c3c67cbab78d673e0d50f21de893274e4982f4698b6e
SHA5129a21efc003d8a09dab95453e210d4562e390bf9c2e3c574fa04ba1a169c7c35fb7debb1c0fdee850d8fe9b52b775274903df6964ba2c2316cce679f2257a8e70
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
3.1MB
MD5d3678cf7d1ed502598ff3fe50c1b11e7
SHA1b706c802ef43af66a05254ffbffcf88fbea7f07a
SHA256ce17f1dca8151d24bde598e8678be5153609f995a6cbfcb052177f7cefdeafa6
SHA512c5a728fd6d6ebeca60ba6ed3d1fdb8151cb62084c605a2fdaeba390f456b95e89b208b932f5c3d520c4d5c60706dd74141195fb57c2a8630d178d34c26992f78
-
Filesize
1.7MB
MD579ba9165be6c8031465525f48fe1a7b0
SHA108d8d07d9929814e3dde81920f86b16d8c9f1284
SHA2568947b1b6d7d09243e7e6d0abeaf0df6b410e5065e8e78e8d66ebace1dbb3a9d9
SHA5129950253099354c3090b0afb173ff36f9bbf7fb6c4aa4f71ede0ea4b1ce7087ed4212fd87290db981c06066d70c1cf45563662f1419dcff68be3240dcd021829f
-
Filesize
950KB
MD525322eaf6927513a16e248ea37a3a9d7
SHA1584e12fb816e27012c61edfd9ed5efbf1137fc08
SHA25604655ec920c50bddbdb9fe5ad953f79baf8bdad0f3d28d2a1ae1aab8caabca52
SHA512336f1892870dfcb10afc267ec3280ae84af3ceed3e5cb42c7e1995ea3b29d0226e4f14bf4463213f1523ac0020283d787966169cbb43a8f3b1478ed2361b6919
-
Filesize
2.7MB
MD51e460c52dda47dcd8107802d6d7912e6
SHA1a83808704df881e5242b4742c5a8194476111fff
SHA2565e5820dd23335657df1c6069466d5a98e5d6cfcce60b899b3fca1528f6ffb2e4
SHA512b16ca3d2bd4ad60833ad96ee3f7e38c46c133a309a22e5e7420f21b234e64255f8eee1d576fb169f4b72e2f17eafde060bc8b89769a0d9a74f395dfbe80e6824
-
Filesize
354KB
MD5f87cf7265f520387d466276cf4be3a85
SHA1b5a3733a6be31c61ec57dec0bf8fee7b2f4fd307
SHA2569b45e0e9091f0647a315676409a3a05303067d475f2fa4096aeff1819844dce2
SHA5128cd1918f954858f10c75a8e65a03bb0a49a4a1f0cc4df1a6305c262e5b1a9f61d6e9522d19ff1b438b6084bec279bee230bded3f3baa140b31fc40e3306f65de
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
6.9MB
MD587fc5821b29f5cdef4d118e71c764501
SHA1011be923a27b204058514e7ab0ffc8d10844a265
SHA2561be77012b7c721e4d4027f214bad43253c1f0116c6b2a4364685d8d69120e2aa
SHA5120aedfce9b49b72f481d9aeecbcef178a19f27d10acb85e9f64be2c541a4400cf36d622900eae9e8c702387570e933937f6ccfeb190d5fc8661c986a981d2c0f8
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5e0d6bf277df9ceeff0714e64df7c9c29
SHA18684d6d5eade58491427fa690082956f606f79b6
SHA25635d535a59a862a49034f089c4126fa06d3b5f720fa32ab2df74d2aa4bb6b217f
SHA5128ec0d902dac83d84f7d77084bf213142c0b023be751f150c5f1ae4bc9543654a555e78770b30066544a6b56f1831040933ef28105437404e65c060dac5f31ce4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\573593f6-89a3-4c0c-a583-a31bd2415799
Filesize745B
MD5dfc9887345030d32ece4aa4e17ebc7fa
SHA1e66154f8782cf704a4800e3d9ae3a9cb53a2f03d
SHA256c3e2e6b3edd048fc9b0dd77a9fb56844e669c3a4bdfc87479fe1fe42058c22a7
SHA512579b9ed74126dfd86269b3d143d6e6593bf12a6f57a074269ac50c43232f4fb05e955a0682e602b60ef5bf96b4a25bdcb1af2ef00d51e5931e7d298a2b4bf849
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\689c9b29-9fd8-4eab-80d1-953973f7350e
Filesize11KB
MD51c53d86b54c434fddd59664f7dace5d4
SHA11e39d2e6535d0766709af60350e8a45a466077ef
SHA25613eebe0567bb471e823b688a5a4563aa53f3ee233c7202d39d2e97c110ed89bb
SHA5120c4bd191bda1d5989b46eecb52e181743fc77f7aae9f7d7f80c12b64274175dd626b68d3427d224c4a283d68d039633e59ac1c6b9685d1c57bae58efa4a6e2dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD56cd230f4913630aa7fa9df9daee3ff89
SHA164aaf2df5852e029e511a52f5017c60238b93be7
SHA256755ea43b4aaa62e7c6613662f4846c357236e1e393cadd8863e52624c6e669e8
SHA512c62fba917981777e8a6f7d8badba62dc4ba0eae6c90f519256ecef363be96877220ace1b2262c234c7d16254f7061698afe0188f09313e3b897f7a4161ae5235
-
Filesize
6KB
MD5c862b3db9aac8cca2c8c27ecb4e99925
SHA14a0f093abb664cc1039affc0a22f7698e4a515fd
SHA256bd728f9654626cb9700fdea667dc571b324ef115953bafcbad8de102794dae91
SHA51252beba1bdf5443a30c2db9f1671853a8fe5b0e09b59de56859ae5471cbd8be6d5a2d784cbe5cc7f17690383b8aeebe00d9f4d8d81162e9a8da8e854201af919a
-
Filesize
6KB
MD5277484d410da1678e8782f8c9a5f3b5a
SHA1ac289c727f5b85dd50f1be8982693e02de9a8fd7
SHA2564fc12bb92b34330b8262828167f90429fdc13f198b3984efe13585f61acf015d
SHA5129172c6e806f0823e8fa584df4a89be933aa0363e41b40533e4c4391a8e12e027e7c51bff8cf96e20ff1f66f3567fa1567b061292094605e33ea204cf202d1103
-
Filesize
6KB
MD5350c6bd995685de6681b6dda023f1099
SHA16a226e36d49a2bde8dacd932f9ef1e796681d045
SHA25696992cb9e8daa9b30bc1c3737f2426395d14cf897105a434579be32fd4c0a3a0
SHA51225a6de6efba56c61114ce7773bf8cdeac710eccb742b26c5bd96ab27df4552912bd7a5a22cb25d854aa30954df526dd1d62849e0435bdf46a5f99a6f04829c66
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5524a5b3e2aa5e57e8a86818b2f0c3938
SHA1f0117eda99062d62706d49612b1dfe262f979518
SHA256fb62a401654bd0b2bd01509d8e8d96c0ceda083f34a5e87650db09e707bf985b
SHA512500e9d634bdad8075c1e7613632d23de4ebace57558237d4fa2371523f38a12a693b7e96b0fcb26ed37282bc6feae38a203ce397254e8b636e1002c84ef8d2d1
-
Filesize
1KB
MD570a2cb007fd30dc03675681dbda52c09
SHA1d308e4fb80631f6ec96c879e778bc454a0943604
SHA256226cf2d9aa4bb2c47e3e09e15db40ae9aab8523de5aae5aebfb278aa2049e56a
SHA5123bc7e660991834ef86a327631f6d393d9605e8ac17aae47e75b5b306dfe3c5245068b42144366596071e9f9a3c906c82d8a6a425f471ff11411377f92d0d0625
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1.8MB
MD513129974d7447f2f74f8377260f5bf82
SHA1897d9332ace7d3eea31e98563562f2b61fb871d7
SHA256baf0e2efe3d441c4631b40d199edd05b56b49620f60bfd03ece1012fde47b30c
SHA5123a3617e221ff0f95ade28b9329b6b05898d3fd2464e352c36746cfabcd503c16896f0712d7ebccb482888adb4da4aa6d0ef5bf5c1197f107a47b8ea1896be54b