Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
random.cmd
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
random.cmd
Resource
win10v2004-20240709-en
General
-
Target
random.cmd
-
Size
2KB
-
MD5
c1b73be75c9a5348a3e36e9ec2993f58
-
SHA1
84b8badeca9fa527ae6b79f3e5920e9fd0fbd906
-
SHA256
a75e65563e853c9fb8863bcf7c2103ec23893f31a42b9332042ea3f5f2d40ea0
-
SHA512
fe6d1df55358ba710c25e0e6b189beca8ce991d65a0fcecefdecacd2b96e0802ea549157c1449d2853f0ab37b8e865ec70e51772d2deefe8238d7581c81bc4a3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2744 chrome.exe 2744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2788 firefox.exe Token: SeDebugPrivilege 2788 firefox.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe Token: SeShutdownPrivilege 2744 chrome.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2788 firefox.exe 2788 firefox.exe 2788 firefox.exe 2788 firefox.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2744 chrome.exe 2788 firefox.exe 2788 firefox.exe 2788 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2744 2472 cmd.exe 31 PID 2472 wrote to memory of 2744 2472 cmd.exe 31 PID 2472 wrote to memory of 2744 2472 cmd.exe 31 PID 2472 wrote to memory of 2804 2472 cmd.exe 32 PID 2472 wrote to memory of 2804 2472 cmd.exe 32 PID 2472 wrote to memory of 2804 2472 cmd.exe 32 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2804 wrote to memory of 2788 2804 firefox.exe 33 PID 2744 wrote to memory of 2824 2744 chrome.exe 34 PID 2744 wrote to memory of 2824 2744 chrome.exe 34 PID 2744 wrote to memory of 2824 2744 chrome.exe 34 PID 2788 wrote to memory of 2452 2788 firefox.exe 35 PID 2788 wrote to memory of 2452 2788 firefox.exe 35 PID 2788 wrote to memory of 2452 2788 firefox.exe 35 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2744 wrote to memory of 380 2744 chrome.exe 37 PID 2788 wrote to memory of 2168 2788 firefox.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\random.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef73c9758,0x7fef73c9768,0x7fef73c97783⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1312,i,10138744825333688397,12133504515989717038,131072 /prefetch:23⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1312,i,10138744825333688397,12133504515989717038,131072 /prefetch:83⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1312,i,10138744825333688397,12133504515989717038,131072 /prefetch:83⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2288 --field-trial-handle=1312,i,10138744825333688397,12133504515989717038,131072 /prefetch:13⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1312,i,10138744825333688397,12133504515989717038,131072 /prefetch:13⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3064 --field-trial-handle=1312,i,10138744825333688397,12133504515989717038,131072 /prefetch:13⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1380 --field-trial-handle=1312,i,10138744825333688397,12133504515989717038,131072 /prefetch:23⤵PID:3244
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.0.281471921\871424254" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1172 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {33d56a75-acf9-4f71-8e8e-c7b354d0dd25} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 1300 45efe58 gpu4⤵PID:2452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.1.140903845\225160079" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {884c4171-1bae-42c8-8a2c-42cf3e2c8e44} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 1516 e71e58 socket4⤵PID:2168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.2.1054498721\406441414" -childID 1 -isForBrowser -prefsHandle 2000 -prefMapHandle 1996 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c985eb71-2131-492b-bab8-ff2d93bdcdef} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 2012 18d5c858 tab4⤵PID:1956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.3.365658627\377948899" -childID 2 -isForBrowser -prefsHandle 2980 -prefMapHandle 2976 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e061aebf-e5a9-48ed-88af-681dbbf49870} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 2992 1ddf2358 tab4⤵PID:1604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.4.815705710\463729338" -childID 3 -isForBrowser -prefsHandle 1180 -prefMapHandle 1112 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6353a7f3-3b6f-443c-9afe-07337a2556f3} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 3652 2017f758 tab4⤵PID:888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.5.1477328460\730229839" -childID 4 -isForBrowser -prefsHandle 3764 -prefMapHandle 3768 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {82d660a1-baf1-4b83-bf85-58fcff5831d2} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 3752 20180658 tab4⤵PID:2484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.6.783197554\582542590" -childID 5 -isForBrowser -prefsHandle 3932 -prefMapHandle 3936 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {39e071fe-fbc7-44f8-96fa-431a78e33a81} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 3920 201ef258 tab4⤵PID:1992
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5e85dfc7068bca227616579b1caafbae0
SHA1a30c2fabf6c716b42abbf667bce913dc24d8facf
SHA256f6b38edc05bda5cf637cfddfe0b52b035299f63d3ce053cde301af9847c4188e
SHA512ca4279543c43b54b4a0fca012d8580b14845c55a3cdf4123bb8497e9df87e39bfa9f6de454bac5b9eede274bae19e7203540a93ca5fedd766de1466c4afa7afe
-
Filesize
6KB
MD512ab5dbcf047901d497901aba8d1624b
SHA18b5f50b6b61e8fa7491a5b0ce3d7afb824854b52
SHA25695b2068218bda2cb80ac61d1a559094226ebe18d8a577875d2eca0d872332696
SHA512965e05695b3e8017f682ee8ba971be7cbf3d10712baddc982970381f7683b12aaf09f3e597e8b80d9c44d4113fd6f9f70ce905c66b200f65d0a7f0ff98edfacc
-
Filesize
6KB
MD53946f8152f3f2f937717c88123e53507
SHA130d9837828c7d81df631a0cc2d94c6356895913a
SHA2563f5f32814bfce41be9a05a93589ff11402489bd42b835cc134e82b35d26c566e
SHA512169f235529af460b53506459ac1e315a1fa463cb41339fdcf5fcf107c8358bc9ca85ecb4b0890d50c318e1cf0f73b60c618ec62fbaf95c66979e7a069aa4c12b
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\sexvjvzg.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5ca6993102ce6c5a78df46945046a55c7
SHA1e6ceda8412d0217d3b01bab3ea273a30396a7db0
SHA256e61e49821e27ea09fb4a6ef9f02b82a1e2f7bba952fbaded23d5ef432fe7f797
SHA5124cc71de5767238b5899b525d80252c7e7324a32da9a39b8fcb6085c3211303e0e4e505994e055057f5242315e1330bf555e569cdf4df8953a1c92fc869a1eed6
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD59ee915dd878fa8fcc3e89661cee39b70
SHA16e26067585b3efdbe2dbf4542627f19c8e79b637
SHA2565faf4939269212e17417f3e7cdc24f9f7005c9736c952a095e5936a59d8fd248
SHA5124255c7358449739328f932af47e97af83fe71a5f50dde671f49d44b3edad018322abc68bb941fc49bcaadb39e0900bae49c8293f1b5544cd31b5814a176c641b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\datareporting\glean\pending_pings\0df73e1a-0f86-4c64-8248-876911d56bd1
Filesize745B
MD5b2ca693334ee21a8c50f6f65c93b7866
SHA1b6dd6652d25f8fff33ce1735e4ef1921d5b1d50b
SHA2561ae908bb86c3818bba52af0a06877e28fdd50f736254dc19d6e6bd08cadaa761
SHA512f0d8d6a02489d5f6f032e455f642e4b77c081b99f5a5fd90dab461cf33ef61b483580db317648de3793df782410ab4b740e41fc6836c7d6c8d7193567f7dc92b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\datareporting\glean\pending_pings\abd09d53-75e3-416e-ad23-915975c2af04
Filesize12KB
MD54781827103886e089c5a44c0a6bcdc98
SHA1a24ed7567481c77ff9fecbd745a0bd96a07948e1
SHA256bc9757fbb4784d95f3f8b6064612c515d32cb33918f3eafd26fc2fa1b08a9afc
SHA512f470c8cafb18f828287ff4076b3bf1c1e7ee8a82760ad538e0ac125acdcd2eae88d7d78193e0cebe6acdd7e0a2085b6bbc98bdeb1e04c61109b2bfc303ce706e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5624b2eeda5411fcda01b6e5ab0b26c64
SHA136bcc86622dbed7cdf9bfda6f8a4249ba4eea3e4
SHA256ae63afba41d310af5152444161241b6bc21a01a561ff987547923f289cb76454
SHA512ef7793566e27a958018aced54b053cd58dc54d487c895227d630d67b4337ffcdb6bbda3db06ef7bc36b4878d700530acebe8272ee341c331a886e70d44c899a3
-
Filesize
7KB
MD528718a70276f56045d0457bcd11f0fda
SHA154785868ddfb545e003c3f119921f07c245c2c1a
SHA256859cb4061c4f502b9d169095269efd8ce92aca88e726e1586423e2449f452b8d
SHA512444ef440d15dfd61eb7efb917722565ef524adb7efa01fe2cc31e2d5e6726963c61f2acb842d8a75bcc843720ea33525071de4ed9f7bb070f6297e9e0020833a
-
Filesize
6KB
MD59c13521dc7e60a42d8f177ccd6889d19
SHA1d46729a40e68467a1527edeb61ec04cee3201b41
SHA256d26988fd0d9ff338ac9bcc2a42f2ec8f2fc118035308853587c4e6a969345d94
SHA512f6a4a5a67fe1521933437c0c2612d2fdd822aab872d4406996c00ad747ad10b4652211d6ad4a005b6c3675df39d79447320b30879612d571cd1baa6d9799601d
-
Filesize
6KB
MD5214fea728ee8780587fa10cbf826e7d0
SHA1e7fa3e35a4fa5fbeac25c0f17920c1100dfcf4e9
SHA256bad5aca128baaf155e79b3b4e2b730ac9a00d9c95082f55eae54efd7ebb5164f
SHA51207adce2c171306143473ad355cb230f0b9ee492fa3f94921ca0def3bc6b1ed0cf528826821bde0213fb3cc001df00f7346a0f16e5f13b1854c7abe0d0203ce28
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD58435f9bcf55aa27aa2024222f3e98bcd
SHA1de520e7d92d3d5a80deab9924b95fec1819d471f
SHA256a724cd488a32a9e550e9a0a99a8cba3d11a6a09cea7bbaa79f190ee03a265dce
SHA51294379aa400562d8c450be8ababe56c494a91b43a269f299edd5722bc0e85410af33a37d9a5a818db1b279b050b6f90e976794cd48cac13a14673752d9917c997