Overview
overview
3Static
static
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...t__.py
windows10-1703-x64
3REPACK BY ...64.dll
windows10-1703-x64
1REPACK BY ...-3.dll
windows10-1703-x64
1REPACK BY ...-8.dll
windows10-1703-x64
1REPACK BY ...-3.dll
windows10-1703-x64
1REPACK BY ...64.dll
windows10-1703-x64
1REPACK BY ...at.dll
windows10-1703-x64
1REPACK BY ...12.dll
windows10-1703-x64
1REPACK BY ...ct.dll
windows10-1703-x64
1REPACK BY ...e3.dll
windows10-1703-x64
1REPACK BY ...ta.dll
windows10-1703-x64
1REPACK BY ...64.dll
windows10-1703-x64
1Analysis
-
max time kernel
1590s -
max time network
1591s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11/07/2024, 22:54
Behavioral task
behavioral1
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/lv_LV/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/mt_MT/__init__.py
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/nl_BE/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/nl_NL/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/no_NO/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/pl_PL/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/pt_BR/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/pt_PT/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/ro_RO/__init__.py
Resource
win10-20240611-en
Behavioral task
behavioral10
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/ru_RU/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/sk_SK/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/sl_SI/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/sv_SE/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/th_TH/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/tl_PH/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/tr_TR/__init__.py
Resource
win10-20240611-en
Behavioral task
behavioral17
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/uk_UA/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/zh_CN/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
REPACK BY CCURATOR/_internal/faker/providers/ssn/zh_TW/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
REPACK BY CCURATOR/_internal/faker/providers/user_agent/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
REPACK BY CCURATOR/_internal/faker/providers/user_agent/en_US/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
REPACK BY CCURATOR/_internal/frozenlist/_frozenlist.cp312-win_amd64.dll
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
REPACK BY CCURATOR/_internal/libcrypto-3.dll
Resource
win10-20240611-en
Behavioral task
behavioral24
Sample
REPACK BY CCURATOR/_internal/libffi-8.dll
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
REPACK BY CCURATOR/_internal/libssl-3.dll
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
REPACK BY CCURATOR/_internal/multidict/_multidict.cp312-win_amd64.dll
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
REPACK BY CCURATOR/_internal/pyexpat.dll
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
REPACK BY CCURATOR/_internal/python312.dll
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
REPACK BY CCURATOR/_internal/select.dll
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
REPACK BY CCURATOR/_internal/sqlite3.dll
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
REPACK BY CCURATOR/_internal/unicodedata.dll
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
REPACK BY CCURATOR/_internal/yarl/_quoting_c.cp312-win_amd64.dll
Resource
win10-20240404-en
General
-
Target
REPACK BY CCURATOR/_internal/faker/providers/ssn/ru_RU/__init__.py
-
Size
106B
-
MD5
4437b106f35eef2d08585081f45df223
-
SHA1
0ce6c4b5ce64277d9b965439dcf5c0567463569b
-
SHA256
142e50223e23ffed64a7b1841b71a3923dbda41b61f946056a420649a8c138b9
-
SHA512
4224443907c4781d4497ed7b35a7e6509f3969fa0db541a9508cd735feaf2b1f1023f9a43bac63756e5c0df5baf1fb9a57b26c5cc03d94627f616a583d27147c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\py_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\py_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\.py OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\.py\ = "py_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\py_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\py_auto_file\shell\open\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\py_auto_file\shell\open\command\ = "\"C:\\Program Files\\Mozilla Firefox\\firefox.exe\" -osint -url \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2492 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4972 firefox.exe Token: SeDebugPrivilege 4972 firefox.exe Token: SeDebugPrivilege 4972 firefox.exe Token: SeDebugPrivilege 4972 firefox.exe Token: SeDebugPrivilege 4972 firefox.exe Token: SeDebugPrivilege 4972 firefox.exe Token: SeDebugPrivilege 4972 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 4972 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2280 2492 OpenWith.exe 76 PID 2492 wrote to memory of 2280 2492 OpenWith.exe 76 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 2280 wrote to memory of 4972 2280 firefox.exe 78 PID 4972 wrote to memory of 3876 4972 firefox.exe 79 PID 4972 wrote to memory of 3876 4972 firefox.exe 79 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 1576 4972 firefox.exe 81 PID 4972 wrote to memory of 3128 4972 firefox.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\REPACK BY CCURATOR\_internal\faker\providers\ssn\ru_RU\__init__.py"1⤵
- Modifies registry class
PID:3192
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\REPACK BY CCURATOR\_internal\faker\providers\ssn\ru_RU\__init__.py"2⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\REPACK BY CCURATOR\_internal\faker\providers\ssn\ru_RU\__init__.py"3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.0.1280073676\40706233" -parentBuildID 20221007134813 -prefsHandle 1700 -prefMapHandle 1676 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77222cfc-65d2-4a1b-948f-63365d2d63aa} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 1792 2072f1efe58 gpu4⤵PID:3876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.1.748884764\739558735" -parentBuildID 20221007134813 -prefsHandle 2140 -prefMapHandle 2136 -prefsLen 21608 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d20b0042-859c-4f0d-94e7-9ddc2b875b44} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 2152 2071cd76558 socket4⤵PID:1576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.2.615868954\1381278020" -childID 1 -isForBrowser -prefsHandle 2808 -prefMapHandle 2776 -prefsLen 21646 -prefMapSize 233444 -jsInitHandle 1300 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb609f2f-d8cb-49e3-8f4f-d2dc31d35ba9} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 2972 2072f15ef58 tab4⤵PID:3128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.3.488909017\648749063" -childID 2 -isForBrowser -prefsHandle 3208 -prefMapHandle 3204 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1300 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a44114ec-329b-44c2-8322-48cbaf7d7ffb} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 3220 2071cd66858 tab4⤵PID:2132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.4.1324568736\1545657374" -childID 3 -isForBrowser -prefsHandle 4748 -prefMapHandle 4744 -prefsLen 26424 -prefMapSize 233444 -jsInitHandle 1300 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6d4b1d0-c666-4845-a722-536d1fd31316} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 4756 2071cd30b58 tab4⤵PID:4900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.5.1709182691\906540142" -childID 4 -isForBrowser -prefsHandle 4892 -prefMapHandle 4896 -prefsLen 26424 -prefMapSize 233444 -jsInitHandle 1300 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a1e33917-d63b-4f7d-a72c-6475898a842c} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 4884 20735b9fe58 tab4⤵PID:4940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.6.1563472568\1235477683" -childID 5 -isForBrowser -prefsHandle 5076 -prefMapHandle 5080 -prefsLen 26424 -prefMapSize 233444 -jsInitHandle 1300 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7dc24145-7925-4d35-b3b6-c4702994eb24} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 5064 20735bd6d58 tab4⤵PID:1760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.7.663617817\2135207446" -childID 6 -isForBrowser -prefsHandle 4304 -prefMapHandle 4440 -prefsLen 26503 -prefMapSize 233444 -jsInitHandle 1300 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1e46f69-8a1d-49e5-8274-17dc0f5e226d} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 2652 2072f15ce58 tab4⤵PID:2900
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD59dd76a7a3693fe5a8719ba2dab9e26f6
SHA10109ed3591f24197504d6aa10132ff2c5e8af5c7
SHA256135239aba8baa717ce5464f1b6f2c04d39717222859f7216b80835b2ab1db705
SHA512ef7d9793956edff5754ee63009ab454ea6ed3932cc1f60491c32f94c45d345268d5aacf0e13c385d44b3f2a8cd5b7fa26d7714c76137ce54914939b08ff42202
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\5CD1EBDF6B57F13C7E783CE5E6D8E9C44014FE1A
Filesize13KB
MD504883b926dbb7f0c7078bf53dc8994e2
SHA185b3bcfa08fff7699cca11bdfcd1f4ac78de36f7
SHA2569728b9759f9f5ceba9df1a49366eefa1b70abfbb865fe60dd9e0b61f80bd6c26
SHA51296788478ee4360ba627a073f065781a509eeea3b91dc37c6fac25764c22536d96bb37d174275f93107c9fdd3e6a18aa77b8d92fd9d3c00365fcbbb6791ab7ea4
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD560d9cba9604308db3d5562b10510f830
SHA13a190dff2bac24b67c3a6404420be6c0d96091e9
SHA256fa309ba8a3a2c8a98cec21dba4fdd9e81d77cc6e47e9ed5cc6726b3b487f535b
SHA512a2461d7747dd758234aa836689590cf128a5b108391162ee90ee39109e0c54ba8d35dd76a73e5fdfd42582c8c976922236ec05c21ded8ca5252a46aae3369adb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\bookmarkbackups\bookmarks-2024-07-11_11_MaaMR8mhAQTbCgvsLumwIQ==.jsonlz4
Filesize945B
MD5838d93fe7f64f4f752cc6aa88379ef54
SHA155f0a2bd40fd96e3a319f886a58891fd9d416c0b
SHA2561b13e0ebb1dab164edd26588e55ea99c9909f18c56c9a3478937d96719d9a54d
SHA5128a4fddabc8792bc2fdc4868e1873f415614c3dc08bbb50272b64fbab124b4516ab0e3be04f31cfb8e02e7b653bff231053208d1638dcf0372439dcec71d33f00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\broadcast-listeners.json
Filesize216B
MD58042dd0a44628fb5e8f3b9bbd5caf615
SHA1b8b301e90b38d6ec485aa3ca7977405f7fc01b70
SHA256e49abf3b19a07da096c841374bc4832115d13bcd9895fcfb69de350f8836d026
SHA512424b58fb0bb776da9132bf4743050bd051c20416801593a32d3f3277507be19bb0eb7059bfdc0bc12023d8249d659417b9449c5bb3251af2ae4ba94f4e562eab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD520b9dfbc79250eeb7b23dbaa1dea7262
SHA1507ffdde65da19004b85dbf3ef8b96e91c311c4b
SHA25614b24b827a28f654d6231ffcf52b25274c0425f2b28fef3809b88ff48c1628af
SHA512b58523e266403f752da687b49893c4647f8ee31ec7df674c0dcbb7a0285ed4e5e66e69d4ea259ab6a4d41e3547f94aaba68d8bab5d7b422c382d60f9390bb6ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\d9962abf-3e73-44fb-a080-2561dfa90f34
Filesize12KB
MD5fce9c5d9f12d258b025bbdd5e7937f0b
SHA1ce01c80d7ab3e76e6b92cf8142a2c35bd752940a
SHA25631bc8645cba196be158b54de84f79ff59eba48438d087c9fbddb513fa495d7a3
SHA5122ff3dfcdb35961185f5f37825fce8945d7c9985be898c489910337a7b802e3c6f88def5c54961f07bf95928d17954a040164ef0deff83ca2619b3f815ec197df
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\e7ace867-880a-49cd-97ed-3da2de30a797
Filesize746B
MD516dcd46a3d126955802953aa1f16c2b2
SHA1d8932d303aeffbd7a9288607e2652755a94cde29
SHA256ca5834a0c43b5b5272e5f50febb8aa41d3df78ec5ded4e0d266e4c4bc3221213
SHA512399e60ca4c8606ae70297035ceeef68ddeb6f67994d9e4dc4b9ca0b99b6d87dfdeb66447a60a2ee0c5ee332a8506307793008d873055604a29605aa6438bbb24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\extensions.json.tmp
Filesize34KB
MD5f8b209c5df7a3833cd9bf79d62380f6d
SHA125dce57657618f1be8d98409f28537e38f0d8d8e
SHA256ca033cb0c618bfd2e0982b404363686a79a0e6672d7a484fe97a5f1d7a74c398
SHA5122758d26715470183d207d2dbe8c9c95698e8f1bb79a2faa0c922f701175cc96e7bd2fbc7e43a2e2fb806c4e237bdfed7dc6e1d1a131dffc071e19cc94903bd1c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
8KB
MD59e0eb05f4910067ffae8d5e6c3568b6f
SHA1778f90916c53d561c4f46b92e63a5b6e43f2e927
SHA256e784fcfe1681bcdf17f66ebd052b01b9c5389ac2e90a030aa3c47e75b3d3c962
SHA512d6142983cb5b892b33b5e4449b9de7867917e041ec79f67feeee12f772af8497cd82cdcfc86cdfd7a6020a58ec8b865cea5938f5fa4a713b102b746a54c8b3ef
-
Filesize
10KB
MD539c8bd18ffa708b8ced6b1050ed07451
SHA1c14ef3cd77f8ea095b61935bfd863c8dcda23266
SHA25612a267957f4bb5eeae6f4d6089a0fb75474834a3f9e438c0676f63e3366b6cb2
SHA5123e1a6062e598f8b9613d3c18b800aed63af2086ba1873b283e67235f1b18a30f679746b0db2b147c809b84334a542a559ee327265f9fb0a167c2c1f56426a679
-
Filesize
10KB
MD50e67c28cb8cc73d38fe9a2162bac966b
SHA153b1d82b6ad6fb7c4c13ca9095e9c679e6f0863b
SHA256b1622e59839496009750a84834591e6370d41a493c6f0940979015db71a54656
SHA512d8cf193064e3ad5b2c7e7e7cb4f969cb70ee29675049d29bf0148c0c71a0fbe1347bbfb78be33ddb9b18939ebc94fc1d02a1ab263c4822d6b7b0a9dffe43fe70
-
Filesize
6KB
MD57f8e0ef9cd3c4ec51e53a72c2c0d639e
SHA130a5e46df399b333cd51fb094e0ef6b3609e19ac
SHA2561bd3b16c77126a837312bea8136825a76cfb82c20e22adbaad21d2f8e3732332
SHA512ed7c15ee6d59fd97cdc6d054b771013016d99e53e1215b552bc355fb738a7e11566b8e8aa813972465c95ff60a7ffe345ca8eabaa53b10158292d2c1a3a0af28
-
Filesize
6KB
MD5614158072bd2d04870c6909ecd9d6cea
SHA1404f592edfb14d511eaf52f6797f56e85fc9390f
SHA25667d053a47bbdc07e1a069e3a96fd8405a052e51119c3b61bebba7d914beb394d
SHA5127237db86d88af1256535d49ac74e494b23f3caf5c4776c5347fdc121ad95c2321eb9c24f0eafcef06831ea01b505387815e4d90f72a14ac3586eb95324eb704c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5c5b4678269465f94890b90b0c32fcab4
SHA15ec3d5ed3db5d442266fce0a999149c9fbd175a2
SHA25661db63f0f48f9893aeaf4a11c9f2ffdd3d691b868ad3eaa1b0a7f89f7bbd961d
SHA5127e5c5b3653f0ef73f414f25a831f26bd6b53ffe7f5c7610f57f0720b871a3a58e9ccc6fc1fe9b380269d699d1e8199c0dd93f0fbcfe68dd17b05930775de9ae0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5cb53228d44172701d1b082998b0ac680
SHA14698c334c07ba9593dd146de44d2b0dbcbef22c7
SHA2562bbe1a735b8118d97013f976c1af5d19120b89234b5a4607a0a3cd6929ebbb36
SHA5126aad02923dccd6626381b4ec126544fad8555fc0e47a72c209579753cddd0c041ef6779279b403e317f229410b78d72b7d59e8afd3e44d1a3433b50a8ad160f4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize7.7MB
MD5d8a1901533250ba18c7a34f7285182d2
SHA1cc66fc7a5218d96dae444408f53185a00fff54c7
SHA256a621c73a80588161cc73343b4b9020d188080a238c0b30f0cc9cd4f5498edc80
SHA512328a7b846e6515d7303c02fb860a4135f0b9dcd11e3d701e03e938d8467201b36a9b7d84a4f888059660bce99971ed08d9ac3e948123122554a5e2eb467b0799
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5731c0e733fe1e3123d366af7c8e578ae
SHA19756304ea773dd9cd96e5996dc79de2ed6a9ae9c
SHA2568f426b4be5e3440fa14d37480f018b7dc3d1a547b0e91c2fbfc6e31d9054a359
SHA512d29e0f2356a3226f64692b390c122d4d70f09f677d9f5d086f2babaeba6574d670171edb24ff52f928871ec489680f57910e21fac1ca8ec08783a07d21b1f427
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\targeting.snapshot.json
Filesize3KB
MD5807961729c69358a7f7665cfcffb75cf
SHA1b90f25f4317c7fbadc572dd95b54fe0c38dd28a4
SHA2569528d8d9026ae86d265afe9908a16fe30336eb73c34787d76d16a639a4daa78b
SHA51262230ef12afd4d04d442fada585ec9b23d6a84595427d5d7c7a3bb08c8b64fe4436e792bd32d6aaf091553fb200f425c96dee86e3b06cd6d2079bd3685a79d29