Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
936s -
max time network
867s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
03/10/2024, 17:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win10-20240404-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiVirus Pro 2017 = "C:\\Users\\Admin\\Downloads\\Antivirus Pro 2017\\[email protected]" [email protected] -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: [email protected] File opened (read-only) \??\J: [email protected] File opened (read-only) \??\M: [email protected] File opened (read-only) \??\S: [email protected] File opened (read-only) \??\W: [email protected] File opened (read-only) \??\E: [email protected] File opened (read-only) \??\P: [email protected] File opened (read-only) \??\Q: [email protected] File opened (read-only) \??\R: [email protected] File opened (read-only) \??\U: [email protected] File opened (read-only) \??\X: [email protected] File opened (read-only) \??\Y: [email protected] File opened (read-only) \??\Z: [email protected] File opened (read-only) \??\H: [email protected] File opened (read-only) \??\L: [email protected] File opened (read-only) \??\T: [email protected] File opened (read-only) \??\G: [email protected] File opened (read-only) \??\K: [email protected] File opened (read-only) \??\N: [email protected] File opened (read-only) \??\O: [email protected] File opened (read-only) \??\V: [email protected] -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 82 raw.githubusercontent.com 83 raw.githubusercontent.com 80 raw.githubusercontent.com 81 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 [email protected] -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings firefox.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\Downloads\Antivirus Pro 2017.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Happy Antivirus.zip:Zone.Identifier firefox.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: 33 4268 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4268 AUDIODG.EXE Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 2228 [email protected] 2228 [email protected] 216 [email protected] 2228 [email protected] 2228 [email protected] 2228 [email protected] 2228 [email protected] 2228 [email protected] 2228 [email protected] 2228 [email protected] -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 316 firefox.exe 316 firefox.exe 316 firefox.exe 2228 [email protected] 2228 [email protected] 216 [email protected] 2228 [email protected] 2228 [email protected] 2228 [email protected] 2228 [email protected] 2228 [email protected] -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 2228 [email protected] 2228 [email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 316 224 firefox.exe 74 PID 224 wrote to memory of 316 224 firefox.exe 74 PID 224 wrote to memory of 316 224 firefox.exe 74 PID 224 wrote to memory of 316 224 firefox.exe 74 PID 224 wrote to memory of 316 224 firefox.exe 74 PID 224 wrote to memory of 316 224 firefox.exe 74 PID 224 wrote to memory of 316 224 firefox.exe 74 PID 224 wrote to memory of 316 224 firefox.exe 74 PID 224 wrote to memory of 316 224 firefox.exe 74 PID 224 wrote to memory of 316 224 firefox.exe 74 PID 224 wrote to memory of 316 224 firefox.exe 74 PID 316 wrote to memory of 4052 316 firefox.exe 75 PID 316 wrote to memory of 4052 316 firefox.exe 75 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 1308 316 firefox.exe 76 PID 316 wrote to memory of 2152 316 firefox.exe 77 PID 316 wrote to memory of 2152 316 firefox.exe 77 PID 316 wrote to memory of 2152 316 firefox.exe 77 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://github.com/Endermanch/MalwareDatabase"1⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://github.com/Endermanch/MalwareDatabase2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.0.1168256589\463733998" -parentBuildID 20221007134813 -prefsHandle 1696 -prefMapHandle 1688 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c67a03e-cfe2-48aa-aba2-a62d70fd5ff0} 316 "\\.\pipe\gecko-crash-server-pipe.316" 1776 24c11ad8458 gpu3⤵PID:4052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.1.459890469\1227601556" -parentBuildID 20221007134813 -prefsHandle 2140 -prefMapHandle 2136 -prefsLen 21608 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {612a6c22-96c8-4e9f-af08-a2f413c9cd75} 316 "\\.\pipe\gecko-crash-server-pipe.316" 2152 24c11a04a58 socket3⤵
- Checks processor information in registry
PID:1308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.2.1291746158\1758127909" -childID 1 -isForBrowser -prefsHandle 2852 -prefMapHandle 2848 -prefsLen 21711 -prefMapSize 233444 -jsInitHandle 1312 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dd69c82-cc4e-4816-9a26-efada4f81422} 316 "\\.\pipe\gecko-crash-server-pipe.316" 2864 24c15bd1858 tab3⤵PID:2152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.3.808264743\1833691765" -childID 2 -isForBrowser -prefsHandle 3476 -prefMapHandle 3472 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1312 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a762ec1-143e-41fa-a2e7-2fb671bc2d30} 316 "\\.\pipe\gecko-crash-server-pipe.316" 3488 24c7f62f058 tab3⤵PID:3796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.4.774031133\812609746" -childID 3 -isForBrowser -prefsHandle 4640 -prefMapHandle 4616 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1312 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9b406a6-99cb-4022-b856-4668f3eb80b4} 316 "\\.\pipe\gecko-crash-server-pipe.316" 4628 24c17f61658 tab3⤵PID:2888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.5.1297124695\1172968446" -childID 4 -isForBrowser -prefsHandle 4736 -prefMapHandle 4740 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1312 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cfe030f3-aecd-453d-9f18-bff9b695a766} 316 "\\.\pipe\gecko-crash-server-pipe.316" 4728 24c18981958 tab3⤵PID:4356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="316.6.490999052\809926456" -childID 5 -isForBrowser -prefsHandle 4824 -prefMapHandle 4924 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1312 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {400710a3-1c63-44f2-b742-58710b082475} 316 "\\.\pipe\gecko-crash-server-pipe.316" 4620 24c18efd058 tab3⤵PID:4376
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1256
-
C:\Users\Admin\Downloads\Antivirus Pro 2017\[email protected]"C:\Users\Admin\Downloads\Antivirus Pro 2017\[email protected]"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:216
-
C:\Users\Admin\Downloads\Antivirus Pro 2017\[email protected]"C:\Users\Admin\Downloads\Antivirus Pro 2017\[email protected]"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2228
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2481⤵
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\4dfade127be8432c9694706be4dca2c1 /t 312 /p 22281⤵PID:68
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5974918541aa75f380aa6cb4d8bd3c4bd
SHA1d0a6a3a301cf5330b00281ee8ff04ed9c3455fc7
SHA256d703fc0de3f07684528bc1931479815a4b9cd7b66fedbb753ca21314a6a300d6
SHA512db829bba3372a6e452d03d24e998ee91d28e3816c9d1a8d81330d450b24dc695e15d2612ec69729beafb28d95271ba55b6be8b95dbe7f4b15f4f65bf5b5279b5
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize11KB
MD51a7b3d016618c3c6aa8e2fca16b82afd
SHA1eda3c98751846c558087e2e4197ef613d7811d4c
SHA256872aa8afe7a9065c00e0a6b73aa7bd7fcf9af7fdec21b701aeed6397c78255cb
SHA5121f75e754c4b9ae80b5e4829174378e8a5db0f2af5042e21d85d0a4f1731c1df58f0d7d95751a50ad5ec941883bcddae2259591e33e1dae4131a33812e9fabc30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5cf978a6bbad2b7ac455870d5aa03d513
SHA1b333ba3412c432e2003d936b09b8346b30639cec
SHA256534e58504ef0b3ee8d7482237df5444e92310136e542a9712d855b18e28ca66f
SHA51256bb1dbbbc310059faa62ea81fcfde1fcab9c1efaf459ab4782b77c27df8473071e0bf693533cfc5932bf46d6ccef9243908dd0de09d417257a99c0ef267cc8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\85bee0e6-9358-43cf-92e8-8a7e042a8e90
Filesize10KB
MD5502cc316fe11b3df8404cae77336620c
SHA103aff76f8665b2f94c94451552bd84b53ce60647
SHA25647017ddffa3ebaba9d10477bfbdc9af1bae3d8db3ca4844b94e88cab702b12c0
SHA51208bf959ef5611b3921ea88e309458cd9004910cfd5917802109837fbf6c15d3163e66a59c2cd4dd4a2e13389d2cbfa2a3e650069793b6fbe39c081173defb0c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\ee9635db-08e6-45b5-b9c0-75fee6f1604c
Filesize746B
MD59847ec0c6de3ff860ae4f250b95b8642
SHA107067bc970ed9c09513e02937f1ad4194d22171b
SHA256175108a4d0e797e1564c6fe9fb9e3dfd063532a82967a45a827d47b47036c768
SHA512991df22704b6f000b9b196664970f1177b9372e2bcd803b83d87e81a6752ffb348c29808394ef56883ee80516e572fca79733ee2e2c1cbf1dc744a1e6875c51f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5c12dd6fc2fd1681a82f3b5ca849c5946
SHA1c402cf16cde02de84c063c6c6a8785bd8ea8b5ed
SHA2569d297165fa94293d262ffe2f0447436eb1d9e6eadd74ce4d73a94b903df267da
SHA5121e1999baa756e3c95fd799fe2eecd133d8c97dc385a451d6eb4e387c40eafcb1a3bf395157a91777d875fa3a4caa23f5eb4ecea245dbf2eb0a97e7316a1f1e94
-
Filesize
7KB
MD522acd1e9d89f90051b0504d8b0f26b80
SHA125c4966fe006fb7a21cfcf5111e80022b1dff4ab
SHA25616413320ac34ae1b2f1e4cf95a40023fda1a511b40eb095c1a825e33728e080a
SHA5126c4e4bf9b0babac9c84c84197d8c7919a6f6e255b7904117a54871bfb3b004eceec7b1768940850e79dd31ec4081bad6b704c52d1681d2f6265aa81049eef938
-
Filesize
6KB
MD5d971031806caeb9547be837ecec80348
SHA1d9bb8c1321bf138484ae3e84929f89de6997e73e
SHA256864fbab6d62e7d9f8d37f615248e6ccbecb9b31cf6b7d967b45eab4474630a90
SHA512b41e0453ef3654992b8a318f120dcc219163994b5b7eb18111d9cf52635890b6d798ce8df1153fc2cebaacb77c2c1923361eb5f472b91483dfdab195e1a1db5f
-
Filesize
6KB
MD509be02fb5ed234ebf3e0766e0c6d2d23
SHA1ec4963180685b2a098c527905b5c85d792387f35
SHA2567fc8a06fcd558f339792da6414a8fe509250f9ed44bd6e0390f57881d3b94e94
SHA512218efe4a8779383ed73b6392ef0d20b609bc7ddbae28c8a869ed8c7fe272c8997e7e7329dd61b09fa574fd2a0fac144e3599a2c4c760a5b10b9115e6dee61753
-
Filesize
6KB
MD5a7b2d51840976f8c1ce0eaff6f2011cc
SHA1b52c7294935b1da16af06d202f2d4d2112fb09e5
SHA256199a5535f7b4296e320227f0f393cb63b85845b8f6d9a93b7c39cd0cb2a72fe4
SHA51217deeb937b5bba4aa3c4be7ce603841ec66967b0965035223293dcd7eb58f7ac9862959a84656e06358f9df517ce96473715d6d8e621b96dd5a017b0922e23d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5e1024da1854d20f0b5719ecd8eb0bdc6
SHA1b327ddb943bf6de331933a7d115589c4306922be
SHA2564447478c39c6a60edc02fc7189f44404ac6b6cd499b4df6739b2f731adb93b65
SHA512e5bfc25286ed15cf1c9ee83b6744e48403ec528d4298a5567f03a2126bac46eda87c71f0a48a6016b56e6aeb8e14de006cf2fee117473e790c5c910cbdb82342
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5f36060730009f664585df565cbddf7de
SHA1728b934d045a841261a83c69fce3ee8756b483df
SHA2560b55eb69d7f456b62ab960335c49aff45ddb30e2c3d916c5def25d285d43896b
SHA5121f8f500fcc45c0a806909b6299ecef23b0b86a0827249c258ef4f32fe5db4f39bd6cf7f22f1084c1159d77a0cbaf13222ee686c4e17bf39581f9d8a6fd10be21
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5aa21755ed7dfb3f6306c525bb0a39656
SHA117ecd41908536aff9d3c99371b5d313415994aa9
SHA256124c69d50300286c5e1decda7d81af9bee44167bb9ac4dfe9ac37627c911ce5e
SHA512b2e11f8ff9c5c09575d0b27e8cc1b342686dbe249930c0e0b35d6e19778d9338b3b8b91af66d1cd3a068047c6e1625a919c4240c48b9783987ee4f2c28a0fd07
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD54a2e8d86d3bae3607f13d7b5bec32905
SHA1e1b3fa04199d63d0d49ed8ed88ee37ab06666d72
SHA256c2f1067dfbeaa6cd25047bbc1d3b42a2d3b9af8fcca8dc12361f34e3504faaaf
SHA512faa708b6c3d070f81b5e532504c1e286e1aa01f24707d3be0d7fffa80602ee1e71d47d109d51b27b8baf38c367faa9616cac07f10ccb32c6ebdf1c06a364f1fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD54b58cbf6baa0b86af3cbc81d2db43294
SHA1040457621fe6bb3d291b1de9c64aad21e2f3f9d9
SHA256ee7f8551f630d41ea5787e71a80cbc116c63c403af0a9dbffac657ee490b036f
SHA5129d12c1c51502d57524ffeabc22fa316d9966e608256b942556b9ec42c6eb3982e0e941d7fe76143ac5b83800000a38f2d4fb89701c8487fbb5ad0735ecd52d06
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD554846474bb683eb9d5e6f791d3783c1c
SHA1919adaa1383cfe5b9f07368a9340980a3e9afb03
SHA256e27e878cf5cb7520574f5beae8fe9b20af36d43872525190e5460a3e53705551
SHA512e8a763ac32c858d869be0662b3207651ee4cec157ce72976aafcf83e29df2561cd2c56b35a80b4071a5656d7421ec8b1ff069b111c0872a10fb1d782f0fa68f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore.jsonlz4
Filesize3KB
MD5b890b0202711d5dd5f5c70aaafc05334
SHA16a9c2e8a2743627618105078c319cc90b59f507a
SHA2562dda6c707e519752ee91f3794b8aacbc6936bc1145e9eed72afd58b714f1800c
SHA5125afd217a116ff531dc6da4011f800f9df016351b86700df1c40d3fa2dcfe61c6672c5eec8febc0e0c7d9da7b795429fc5eae129a7a1185a6c6bd83bb9a442535
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize192KB
MD527c852e8b65a3131c965e9dfbfd9c037
SHA12e4ba83cf9107c8d6aa7e750f4a4b24bf273424d
SHA2562a936d0fafd9d367fef34cc780ec449d9be6009b02a2ffb91e15f8f4fdd7253f
SHA51274a4bd8ad498878bcfd2b4825bfe94401fb06169d86da92b19459e57356646683193c8524d01b130866531ee691636231ce86ce0953043a0e3e4232ba5d57045
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD569cc4ce68ce55e681c368d219f32a10d
SHA128afdfa7d331fbb72dd993ecefea313f2799b446
SHA256d4e13af44e4664821cf15715fbb0038aa5d3f03e3b7a15a7efd4745d77a4b8d2
SHA5124b1a2f353f0d8e1efbd9f1deafc551fdde86bed7d32662d025640b67c3a9e71e0c635a3fdab10196eb32ef5870fb58a6973c8920c7f42adbbd537ffb18c399df
-
Filesize
794KB
MD5ab1187f7c6ac5a5d9c45020c8b7492fe
SHA10d765ed785ac662ac13fb9428840911fb0cb3c8f
SHA2568203f1de1fa5ab346580681f6a4c405930d66e391fc8d2da665ac515fd9c430a
SHA512bbc6594001a2802ed654fe730211c75178b0910c2d1e657399de75a95e9ce28a87b38611e30642baeae6e110825599e182d40f8e940156607a40f4baa8aeddf2