Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
7af72d60902f6d9bd4ddb565cd4b0946.exe
Resource
win7-20240903-en
General
-
Target
7af72d60902f6d9bd4ddb565cd4b0946.exe
-
Size
1.8MB
-
MD5
7af72d60902f6d9bd4ddb565cd4b0946
-
SHA1
9a81b3d5d58e5f5ad4719dcf4ff3f5c59aebbebc
-
SHA256
5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5
-
SHA512
d4429d47082bb917e84a031cf71fb62fdbf4c7b77febde69fee4188b21da2d97b00d3f02d25f08226124b84a7df030a6d00ffd1fc43df66a1554582f5b462c50
-
SSDEEP
49152:Sw+XuSlBp9q3mmc5+d8hJC6gPJ/ReTbdVM:pAuSl39q3mmc5+d8nNgFReTZV
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5712-477-0x0000000000410000-0x0000000000844000-memory.dmp healer behavioral2/memory/5712-478-0x0000000000410000-0x0000000000844000-memory.dmp healer behavioral2/memory/5712-510-0x0000000000410000-0x0000000000844000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 60a3f31b77.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 60a3f31b77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 60a3f31b77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 60a3f31b77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 60a3f31b77.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 60a3f31b77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 60a3f31b77.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 60a3f31b77.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 60a3f31b77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 60a3f31b77.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7af72d60902f6d9bd4ddb565cd4b0946.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 81e76b37ed.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f2832e5128.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 60a3f31b77.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 26 5540 rapes.exe 26 5540 rapes.exe 26 5540 rapes.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 60a3f31b77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7af72d60902f6d9bd4ddb565cd4b0946.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7af72d60902f6d9bd4ddb565cd4b0946.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 81e76b37ed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f2832e5128.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 81e76b37ed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f2832e5128.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 60a3f31b77.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 7af72d60902f6d9bd4ddb565cd4b0946.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 7 IoCs
pid Process 5540 rapes.exe 2360 81e76b37ed.exe 3396 f2832e5128.exe 960 ee03782cba.exe 5712 60a3f31b77.exe 4032 rapes.exe 5784 rapes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 7af72d60902f6d9bd4ddb565cd4b0946.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 81e76b37ed.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine f2832e5128.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 60a3f31b77.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 60a3f31b77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 60a3f31b77.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f2832e5128.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10318620101\\f2832e5128.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ee03782cba.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10318630101\\ee03782cba.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\60a3f31b77.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10318640101\\60a3f31b77.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\81e76b37ed.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10318610101\\81e76b37ed.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Public\desktop.ini firefox.exe File opened for modification C:\Users\Public\Documents\desktop.ini firefox.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000700000002427c-68.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1652 7af72d60902f6d9bd4ddb565cd4b0946.exe 5540 rapes.exe 2360 81e76b37ed.exe 3396 f2832e5128.exe 5712 60a3f31b77.exe 4032 rapes.exe 5784 rapes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 7af72d60902f6d9bd4ddb565cd4b0946.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81e76b37ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2832e5128.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee03782cba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ee03782cba.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage ee03782cba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60a3f31b77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7af72d60902f6d9bd4ddb565cd4b0946.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1960 taskkill.exe 1460 taskkill.exe 1428 taskkill.exe 1148 taskkill.exe 5272 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1652 7af72d60902f6d9bd4ddb565cd4b0946.exe 1652 7af72d60902f6d9bd4ddb565cd4b0946.exe 5540 rapes.exe 5540 rapes.exe 2360 81e76b37ed.exe 2360 81e76b37ed.exe 2360 81e76b37ed.exe 2360 81e76b37ed.exe 2360 81e76b37ed.exe 2360 81e76b37ed.exe 3396 f2832e5128.exe 3396 f2832e5128.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 5712 60a3f31b77.exe 5712 60a3f31b77.exe 5712 60a3f31b77.exe 5712 60a3f31b77.exe 5712 60a3f31b77.exe 4032 rapes.exe 4032 rapes.exe 5784 rapes.exe 5784 rapes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1148 taskkill.exe Token: SeDebugPrivilege 5272 taskkill.exe Token: SeDebugPrivilege 1960 taskkill.exe Token: SeDebugPrivilege 1460 taskkill.exe Token: SeDebugPrivilege 1428 taskkill.exe Token: SeDebugPrivilege 5876 firefox.exe Token: SeDebugPrivilege 5876 firefox.exe Token: SeDebugPrivilege 5712 60a3f31b77.exe Token: SeDebugPrivilege 5876 firefox.exe Token: SeDebugPrivilege 5876 firefox.exe Token: SeDebugPrivilege 5876 firefox.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 1652 7af72d60902f6d9bd4ddb565cd4b0946.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 5876 firefox.exe 960 ee03782cba.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 960 ee03782cba.exe 5876 firefox.exe 960 ee03782cba.exe 960 ee03782cba.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 5876 firefox.exe 960 ee03782cba.exe 960 ee03782cba.exe 960 ee03782cba.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5876 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 5540 1652 7af72d60902f6d9bd4ddb565cd4b0946.exe 89 PID 1652 wrote to memory of 5540 1652 7af72d60902f6d9bd4ddb565cd4b0946.exe 89 PID 1652 wrote to memory of 5540 1652 7af72d60902f6d9bd4ddb565cd4b0946.exe 89 PID 5540 wrote to memory of 2360 5540 rapes.exe 96 PID 5540 wrote to memory of 2360 5540 rapes.exe 96 PID 5540 wrote to memory of 2360 5540 rapes.exe 96 PID 5540 wrote to memory of 3396 5540 rapes.exe 98 PID 5540 wrote to memory of 3396 5540 rapes.exe 98 PID 5540 wrote to memory of 3396 5540 rapes.exe 98 PID 5540 wrote to memory of 960 5540 rapes.exe 99 PID 5540 wrote to memory of 960 5540 rapes.exe 99 PID 5540 wrote to memory of 960 5540 rapes.exe 99 PID 960 wrote to memory of 1148 960 ee03782cba.exe 100 PID 960 wrote to memory of 1148 960 ee03782cba.exe 100 PID 960 wrote to memory of 1148 960 ee03782cba.exe 100 PID 960 wrote to memory of 5272 960 ee03782cba.exe 102 PID 960 wrote to memory of 5272 960 ee03782cba.exe 102 PID 960 wrote to memory of 5272 960 ee03782cba.exe 102 PID 960 wrote to memory of 1960 960 ee03782cba.exe 104 PID 960 wrote to memory of 1960 960 ee03782cba.exe 104 PID 960 wrote to memory of 1960 960 ee03782cba.exe 104 PID 960 wrote to memory of 1460 960 ee03782cba.exe 106 PID 960 wrote to memory of 1460 960 ee03782cba.exe 106 PID 960 wrote to memory of 1460 960 ee03782cba.exe 106 PID 960 wrote to memory of 1428 960 ee03782cba.exe 108 PID 960 wrote to memory of 1428 960 ee03782cba.exe 108 PID 960 wrote to memory of 1428 960 ee03782cba.exe 108 PID 960 wrote to memory of 1664 960 ee03782cba.exe 110 PID 960 wrote to memory of 1664 960 ee03782cba.exe 110 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 1664 wrote to memory of 5876 1664 firefox.exe 111 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 PID 5876 wrote to memory of 2216 5876 firefox.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7af72d60902f6d9bd4ddb565cd4b0946.exe"C:\Users\Admin\AppData\Local\Temp\7af72d60902f6d9bd4ddb565cd4b0946.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5540 -
C:\Users\Admin\AppData\Local\Temp\10318610101\81e76b37ed.exe"C:\Users\Admin\AppData\Local\Temp\10318610101\81e76b37ed.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\10318620101\f2832e5128.exe"C:\Users\Admin\AppData\Local\Temp\10318620101\f2832e5128.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\10318630101\ee03782cba.exe"C:\Users\Admin\AppData\Local\Temp\10318630101\ee03782cba.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5876 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2016 -prefsLen 27099 -prefMapHandle 2020 -prefMapSize 270279 -ipcHandle 2088 -initialChannelId {341249d2-818d-4ce0-a75f-722fe03a3dba} -parentPid 5876 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5876" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu6⤵PID:2216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2492 -prefsLen 27135 -prefMapHandle 2496 -prefMapSize 270279 -ipcHandle 2504 -initialChannelId {98b5a646-fb05-4b5d-b462-32465dad1f18} -parentPid 5876 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5876" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket6⤵PID:3456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3804 -prefsLen 25164 -prefMapHandle 3808 -prefMapSize 270279 -jsInitHandle 3812 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3820 -initialChannelId {fa0c0e92-6222-47af-b3ae-73d47b35901c} -parentPid 5876 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5876" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab6⤵
- Checks processor information in registry
PID:2168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3968 -prefsLen 27276 -prefMapHandle 3972 -prefMapSize 270279 -ipcHandle 4056 -initialChannelId {757c87a0-29d2-4078-ab0d-48344782b296} -parentPid 5876 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5876" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd6⤵PID:1180
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2744 -prefsLen 34775 -prefMapHandle 4392 -prefMapSize 270279 -jsInitHandle 4420 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4428 -initialChannelId {7b248170-dd9e-4b07-adc2-8e1dadc0af14} -parentPid 5876 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5876" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab6⤵
- Checks processor information in registry
PID:3188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5040 -prefsLen 35012 -prefMapHandle 5044 -prefMapSize 270279 -ipcHandle 5052 -initialChannelId {c73cdae8-3d88-4116-a51e-41074e14d6d3} -parentPid 5876 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5876" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility6⤵
- Checks processor information in registry
PID:5988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5188 -prefsLen 32900 -prefMapHandle 5192 -prefMapSize 270279 -jsInitHandle 5196 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5180 -initialChannelId {715ce13c-2e16-42f7-b0e9-079dcd790e96} -parentPid 5876 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5876" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab6⤵
- Checks processor information in registry
PID:5588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5568 -prefsLen 32952 -prefMapHandle 5572 -prefMapSize 270279 -jsInitHandle 5576 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3020 -initialChannelId {0e6efcc5-65de-4b3c-b9e0-a9b97f7b3d4e} -parentPid 5876 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5876" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab6⤵
- Checks processor information in registry
PID:4608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5592 -prefsLen 32952 -prefMapHandle 5596 -prefMapSize 270279 -jsInitHandle 5600 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5552 -initialChannelId {f8acdd20-0069-408e-8961-33c95a2c17ca} -parentPid 5876 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5876" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab6⤵
- Checks processor information in registry
PID:4220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10318640101\60a3f31b77.exe"C:\Users\Admin\AppData\Local\Temp\10318640101\60a3f31b77.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5712
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5784
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\9z25oblb.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD52c80d38ca0827fc8029847c0d6881a4a
SHA140dcb1839792ae3f23f2507822e3c25d5a47f17f
SHA256f486f100add2d9a29dd4fa51cdd539965dd122ecac40da8e01674d99ed0d0e10
SHA51255a0d2a374873eacba15d4202b58fb15ba71d17b89305fa5326712732df7a809d2b79b1a549a0c65333fd7a6fc558250c1676420e92f7764323b11f444e569b9
-
Filesize
3.6MB
MD5eee2a159d9f96c4dd33473b38ae62050
SHA1cd8b28c9f4132723de49be74dd84ea12a42eef54
SHA25652c720ca9b1d7649214694bc46a9ea0cf2ee3091e1ac717633ee06b6e2864384
SHA512553c8b347e1654ca256dd4b760deb669cf394763419c972bb60a555006525afed2cff53b2516e8b239bc4bb35afd5429bd89611303143e7e65b901c0f5c2cc07
-
Filesize
2.8MB
MD5ddc21af1dcce8a34e50651c30f50fea6
SHA10ee349ca451d76b5e647f0e01184bc5313619107
SHA2562fdec735ecc810b4741cfe97a95fe352ec5cd931b55b148ea98825ca31333ed1
SHA512d6100f447c6b9eb6ccae0343deef01da8bb9d3ce6e570b34c05f217a8ad3540593025bad079f8e64df87710ab77d2be3f44f8588d2247d649515991c3a44d118
-
Filesize
1.7MB
MD58d11087a47c122d153a0f32a60ec79b7
SHA1d60299a6118fb5706dc3fab2b3d49541374720fe
SHA256cc886d5b507c8dd985e23d060b0b890bbf68683b46c572bf7b3e58f66a6be48a
SHA5124119bf9786b26d39d4216481737087529b7543e4382c5860fe7e145571839487ddd783a8d83f0c084df1516ee9f7780212d4d8dac812251e6834d8f26ef28436
-
Filesize
950KB
MD581c02be5ee8d37c628c7a0016c468149
SHA189bc9d55785d71f396fb2b50960aa248799ebef9
SHA256186bdab14c6784d101350b0386d06e3c0b890f895d64cdf2a1a6e9cc32e48f57
SHA512ebf4058e4a096f0b24221574ccd372f864dc4db853c3bf6d763d3286af49a348372656c4de5efb173b07f5096647bed4747e7d13109989743e95a7e6bb091fab
-
Filesize
1.6MB
MD50352afc500e6104d51a1099c441fda4a
SHA1f13c4e80db7722aeeb6a8aceb77fb3ca8bb1a860
SHA2568df4bce66ec1404ffc71cc3cafdbd198f3d6a5b45166e9be8ef42feebc42e9c7
SHA5127e43882d65ad9115b17921792130fd7b5b172eb4a385be90164b979198d4bf5b816b24b6933a9e501300d79b36af4d749f10dcd40e21aa09809ce6518f8c64c7
-
Filesize
1.8MB
MD57af72d60902f6d9bd4ddb565cd4b0946
SHA19a81b3d5d58e5f5ad4719dcf4ff3f5c59aebbebc
SHA2565e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5
SHA512d4429d47082bb917e84a031cf71fb62fdbf4c7b77febde69fee4188b21da2d97b00d3f02d25f08226124b84a7df030a6d00ffd1fc43df66a1554582f5b462c50
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize10KB
MD5d39f7e6b85ed5763f284bd363dbd5975
SHA14a4a06df2b6b9e4434eb037c8f582d8b27750159
SHA256d1972f9f5d398ed1bf7cca6b014f08de71ec3bcb76a5661cde91af95c68a90e0
SHA5129c0b7a1fe57ca51e3fb470efe956836b1520c8b579fb4a8f5554dc17b5e84f5dab1fdbdde7cfbd13777fce996e95fddb9652d244db0f0f1473b93e9e197596d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize17KB
MD54f770b9e86ad382b5514baa72d04e779
SHA10f3332dad6c80e9b5081a58d78e32baf5f2f8db5
SHA256d85e945155e078332e2cb20d1ee55771bdcde7cd13920628978ea86b1c6ab391
SHA512e370b29c2ac674a2ad77cb6495dbea94f9257f4d37bc65638fec7460b42837cd3d399a873dfc196403742a3549b0ee497decc33a110ade704ca68c0995a0edf9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ec7384284ed8aaacfc298523bc303a94
SHA16bd914c7d5b4f632ae898553aef95df5e19fd48c
SHA256a4bfaeb8a0fc6a0ada213b36c71e262441c3e0868e855b5f47af07d570ddda82
SHA512c1a4239b2578ea08d01ac984af285d678a831e88c41904b1a0b927be760ab4232381c0402a17869a29af7cbb11fa676e9c8f875dc44dfa393f9e4a965f093229
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5605cbd02e61546acd5709ff1f1460af7
SHA18933d15a7a11c68af4ce7fb85937ae6d1a21bba1
SHA256d2004466a81f8f7a3693e23c1ff0f2f5cd922a8c3c1b1aaf964e92dee64b6653
SHA512f6f87fd3f333940b8678ce6306980d65870367f22c6d70275a3e5e80204eb1e99062c8f35da2860334adbdc9d6f514d3a3b3b208c087f8f66d2ab55ac8e5c06e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5857a58214cdea7e1494ee33293774dc4
SHA171cefeb26fe7d0ea29c325e53cc5c5bb3e3d8768
SHA256c4d5484e90266ccf6cc46edb897dbeef42b39e3f1694b5bd7be12259da0c02b3
SHA512dc7652d751e4ad76744dcd028390ec81fb6e26710c21afb68d26df0fc80d66981d03fea8f6fff645ccdc8837bf905f141b9f931a250337cca268b00b64414c48
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5a08b3af8f5345f41802801557244ffda
SHA1fbeb30e6bbca9ea5562737d9e87c7167339058b5
SHA2560c3e09c71ea0eacd99793c941f3b6067e0f8aab010ffc42ca23fa0209afa8b2b
SHA512cb11a1bc68aefad59f933e01bc5d49e83b8649540491b0edae6d442aaee60d34156169f3ee17706e50c04f656a39b04630e3245229413577e7e647c3e178fc6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5863202019273ee75cd51d103687b6fa4
SHA18735c9ade4fc7516b48d7fc86c772a99c9832903
SHA2562aa4f72aa5470f09fbe3b83b60abe49ca32b1d782e4a25f82ba8402c5aed9041
SHA512b9e8894423ecdfe8084bc5dc2ebcb6bdb3596940a46a3ccdfacea4c3551bfd025543a78f07c19bb8cee51a14b2491ce46eeff57496bdb506b05feaa27d4d1980
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\events\events
Filesize1KB
MD54abe402426f603a80648598b463ce69d
SHA1911ece02ed21e6f4a087c6a2a62000d193140fba
SHA2563c96f1261ebc6352264769b63e4e6717be4052e31da259480f820437d7a8afb0
SHA5128c9e67755a08f5e9633869f63c6ca6bb87ce050cb31c82d649e84b081fefd8692c759005e819c6ed3dc2006f00bd749921c6986b5e3339dcfb5496deb45adcef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\052928e0-86c4-4723-9bac-15ea2366ecf5
Filesize235B
MD5593bfdba04e875a34102cfc219973c6d
SHA1fcd36ad4c75e3d218750882acb006f2a42ff8478
SHA256adf159e072900b135b5e755a8ce1dc8d8d2de818f6b8b5b91ad89e0d679b0a2e
SHA512c59c88305a707ce341cf47376949ce11623c49d763c8e9ca1cd5c1412fafd4dff77b40b8f57323baefda0b8a05242ebedd426bcf007b1c81630d9faa8941f101
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\3b7ae028-ca92-49eb-a4d6-79ed540c71ea
Filesize886B
MD50dde2acf6a65b8369032ff678d9e5512
SHA1715b154eadb4c8bc08e204a3cac049ef3419dd56
SHA256209a43d35811aa43f9947afba4b1134c916172b38458fcfe843f627f98808532
SHA5129d796bee722dad105e0d5d356a679381c4a1898fce473fcf9f65aab1e077cab9a8d293b41a3c6d194c2e217273ff0b820e5c4884f8418213151cdd9bdea9f56a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\4c8f8d38-8b1a-46af-859d-21eaff5e16f1
Filesize883B
MD519bbac4ebe20ec21be72324bac05f6c0
SHA166705c24915637c593c8631fdb1b353fa03cd010
SHA256499c1ca7797416566f263a1b313da1f6c94ac2dd31fb79b034d04bf5d47fd5d2
SHA512b0ed2dc7d4890dbdb2e014270cff983d32725d4301422290755216d37fec47d63aacba1f655b77d6c785cd97ee71ced81d647f1ee05734bbc94049014f8777b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\51715d30-3c7e-4ae1-b4ec-709d5072f769
Filesize16KB
MD5dcf486e5176698f10cd96b67d70a09b2
SHA1848b6aa34a1a884bca8c071a94761fb1edd85b59
SHA2564289d759f46eb01067ab85ba6b54d83e937b0e0905b95abe653fb071aac93000
SHA5128059c423669ab7a54fdc75b2c2f294e4635ce7bdf9359a9d4c765a332cc42b84298b30ac72933fb587c63fb8bd9a2410ca1d8b78ee1224effd18413325a011ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\61b8a3e1-da16-45a0-b910-efa059ecb0d4
Filesize235B
MD55bf2d42f0dfc854f06b49aece212b064
SHA167e5f069865e9d271914569ff0646924b9dc5215
SHA2562205ad4064243d4a461f4dde9272adc9a031170b98d6a08b6fe6bb0a29ab3944
SHA512de16eae8b2996f649cc1d6fbe3dfb72a5e705732de00168fa1f252eebfec7f97fc7c667daae1a5367398c54db6c13385051597e3601ff26a4d4aed13163be425
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\9d694e17-6659-4e7c-be63-ae914fe4d8f8
Filesize2KB
MD52ca79063ead8c04fe4a6b535cb77e85a
SHA1642a056e4bb9796d96ac92d1795d0009c5fd96bc
SHA256f559c1fda75423e04d0d4913ad9dbad80136c0c18f93ba8f0ab0dfb60dcbb196
SHA5127102c12006b480c1a1d4060648381f55ca29620356619c3357d7bc8047d39a30d3caa63dc0e7deb85ae4c1f32799141db949e690205b6c39c45668f27215f631
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
8KB
MD54bca6271da3f28522d6903285ff2930f
SHA133be06a54e5d27568c544e3c3229b92e71073e93
SHA256f93a6e0364cbce92c452e54f08a833cd10034fb5eacd0316a3758c1baa996d2b
SHA5126613e5f13d4e8e83179728a0bb2ac198ebdb4e5ff65f1902ce58a8c1ebf6b77c90fbe5c33f0c54eaa84a5e5cb3b70aa90739b361557033f4d31ecbb12bca4716
-
Filesize
6KB
MD50478d82ed4fd07272a26b7e086b0a1a3
SHA19778283c9e627bbaac81ccfedbdd9e4eb336539e
SHA2566e689b996784f136052e8012b51d3dd3f3b5da958aba14ada837e3de57c781c3
SHA5124b69cd42f780d96163fd6fce430b9c0c25ecb4c05088657332a6bfe5ff90f4278bf79c3c6590122a1bdbf193e181d1066a04b0abca43cbb3c44113efc48a9f6d
-
Filesize
6KB
MD5cb05353c9096b193cb38e489e7fa23f6
SHA1a77505d95b2a9f21260d9753cfae856c4c5a2ec2
SHA256422a7cca792c4ffbdcd82431def13d70a79f0eea1555ab73f7ac3d2ca89f80f9
SHA5126d5997f4595270e3bdf340465bac34c33fc3cc3a56136fb56a0904c242d4a1cc94c32019cfe129af38599b7128db01b535aa3d01c35d876412782bad1977234a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5f1135abf0a40966029a450e9933fdf09
SHA10de74dd8f81c067dfc9994aeda8da1d97c2b443e
SHA2565efaf4192a38ae47f41954fed3ecb9fe76a235e217a8cedacba3e2c264386701
SHA512f7a7fec6d5690767c4d2271450fb3a627928c3ebca28c116d13574a61650a8f1092f4b211477a14004d463b55f75630902c8636cfc40952224c9b0bdbc9000ca