Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
b58725b0a514974aae36a20730adc4b3
-
SHA1
a99eb4395fc9a95cad952a7d4bd444fb3baa9103
-
SHA256
a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76
-
SHA512
21ed4926463abff571fa30161607cfc58ef2106683295830764a6008d9e6c1228271966c951c030b13db295217b7f568797ebf74fb02a4ed86d198a34d9b7a29
-
SSDEEP
49152:ugpWvpPq4PRzgbjv65CIjyoNaA1bKGfBMK:usWvzgbkaA1TSK
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
axplong.exe65a00460db.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65a00460db.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
file.exeaxplong.exe65a00460db.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65a00460db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65a00460db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe -
Executes dropped EXE 3 IoCs
Processes:
axplong.exe65a00460db.exe6e443797a2.exepid process 1744 axplong.exe 2548 65a00460db.exe 2020 6e443797a2.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
file.exeaxplong.exe65a00460db.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 65a00460db.exe -
Loads dropped DLL 5 IoCs
Processes:
file.exeaxplong.exepid process 2380 file.exe 2380 file.exe 1744 axplong.exe 1744 axplong.exe 1744 axplong.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
axplong.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\65a00460db.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002741001\\65a00460db.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\6e443797a2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002742001\\6e443797a2.exe" axplong.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1002742001\6e443797a2.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
file.exeaxplong.exe65a00460db.exepid process 2380 file.exe 1744 axplong.exe 2548 65a00460db.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc process File created C:\Windows\Tasks\axplong.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file.exeaxplong.exe6e443797a2.exetaskkill.exetaskkill.exe65a00460db.exetaskkill.exetaskkill.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e443797a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65a00460db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2300 taskkill.exe 2076 taskkill.exe 2604 taskkill.exe 2108 taskkill.exe 1256 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
file.exeaxplong.exe65a00460db.exe6e443797a2.exepid process 2380 file.exe 1744 axplong.exe 2548 65a00460db.exe 2020 6e443797a2.exe 2020 6e443797a2.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exedescription pid process Token: SeDebugPrivilege 2604 taskkill.exe Token: SeDebugPrivilege 2108 taskkill.exe Token: SeDebugPrivilege 1256 taskkill.exe Token: SeDebugPrivilege 2300 taskkill.exe Token: SeDebugPrivilege 2076 taskkill.exe Token: SeDebugPrivilege 1604 firefox.exe Token: SeDebugPrivilege 1604 firefox.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
file.exe6e443797a2.exefirefox.exepid process 2380 file.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 2020 6e443797a2.exe 2020 6e443797a2.exe -
Suspicious use of SendNotifyMessage 16 IoCs
Processes:
6e443797a2.exefirefox.exepid process 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 2020 6e443797a2.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 2020 6e443797a2.exe 2020 6e443797a2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeaxplong.exe6e443797a2.exefirefox.exefirefox.exedescription pid process target process PID 2380 wrote to memory of 1744 2380 file.exe axplong.exe PID 2380 wrote to memory of 1744 2380 file.exe axplong.exe PID 2380 wrote to memory of 1744 2380 file.exe axplong.exe PID 2380 wrote to memory of 1744 2380 file.exe axplong.exe PID 1744 wrote to memory of 2548 1744 axplong.exe 65a00460db.exe PID 1744 wrote to memory of 2548 1744 axplong.exe 65a00460db.exe PID 1744 wrote to memory of 2548 1744 axplong.exe 65a00460db.exe PID 1744 wrote to memory of 2548 1744 axplong.exe 65a00460db.exe PID 1744 wrote to memory of 2020 1744 axplong.exe 6e443797a2.exe PID 1744 wrote to memory of 2020 1744 axplong.exe 6e443797a2.exe PID 1744 wrote to memory of 2020 1744 axplong.exe 6e443797a2.exe PID 1744 wrote to memory of 2020 1744 axplong.exe 6e443797a2.exe PID 2020 wrote to memory of 2604 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2604 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2604 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2604 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2108 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2108 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2108 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2108 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 1256 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 1256 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 1256 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 1256 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2300 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2300 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2300 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2300 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2076 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2076 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2076 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 2076 2020 6e443797a2.exe taskkill.exe PID 2020 wrote to memory of 1132 2020 6e443797a2.exe firefox.exe PID 2020 wrote to memory of 1132 2020 6e443797a2.exe firefox.exe PID 2020 wrote to memory of 1132 2020 6e443797a2.exe firefox.exe PID 2020 wrote to memory of 1132 2020 6e443797a2.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1132 wrote to memory of 1604 1132 firefox.exe firefox.exe PID 1604 wrote to memory of 2012 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2012 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2012 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe PID 1604 wrote to memory of 2484 1604 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\1002741001\65a00460db.exe"C:\Users\Admin\AppData\Local\Temp\1002741001\65a00460db.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\1002742001\6e443797a2.exe"C:\Users\Admin\AppData\Local\Temp\1002742001\6e443797a2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1604.0.1511800591\1394658956" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1228 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {24bf2c38-279c-4ad3-9201-8c011d776a6d} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" 1328 109d1b58 gpu6⤵PID:2012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1604.1.1662216289\1318599184" -parentBuildID 20221007134813 -prefsHandle 1504 -prefMapHandle 1500 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {da263ef4-967d-401d-b9ae-ce6229fcfb9f} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" 1516 e73f58 socket6⤵PID:2484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1604.2.667985210\237775714" -childID 1 -isForBrowser -prefsHandle 2056 -prefMapHandle 2052 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {89e2ae9c-a468-44e5-a038-8f584aee89f6} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" 2068 1a29f258 tab6⤵PID:2888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1604.3.1640500868\8470368" -childID 2 -isForBrowser -prefsHandle 2904 -prefMapHandle 2896 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {be53dc23-9dde-4cf4-960c-a31a25a499b5} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" 2920 e6bf58 tab6⤵PID:1060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1604.4.641200652\655103566" -childID 3 -isForBrowser -prefsHandle 3528 -prefMapHandle 2328 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b5ad5c7-ebbb-43d6-adf4-08a47a9e8ad2} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" 3556 1e6feb58 tab6⤵PID:1768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1604.5.1989328586\492186013" -childID 4 -isForBrowser -prefsHandle 3732 -prefMapHandle 3736 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f972e65-6f54-49c1-a519-50dfe99e39ac} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" 3720 1e6fd358 tab6⤵PID:1132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1604.6.18496120\1289023419" -childID 5 -isForBrowser -prefsHandle 3896 -prefMapHandle 3900 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {419e1dd3-b7fb-42ce-bd9b-b3263d11029d} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" 3884 1e6fdc58 tab6⤵PID:1908
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize29KB
MD50beaccd37bf3ef6e238172b025aec0f2
SHA170ca6651c3cd79bc11157313398c04fa85bce457
SHA2561ef7072ec9ed3a56e84fafa4c7d7698dc7aa9e15ee13d0ee563a73debfab4be8
SHA512cda4057e3882fe90b66e905ecc09d9bfb7e4192ca8b12298dfff81332a4669889078c66515345d0e9e938dc4cda1b29a0ecc45afaec743e9db7bf7ec1932cb55
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.7MB
MD559b3273d9d5c8f80b5cfe9e160188073
SHA13dfe989cba1316ed1a4e82b8bf9e73301749e559
SHA256101e5dd7863cc4cc10c084d7468f2bd81a77323f9fb49b4b5ebd6077a5552ba8
SHA5127a5b0b3e6f368a8e34abbb9059d0399937373eccac17de9cbd9e911833ed48d369e97fc3fbf02ba73d66661a2b50926f0630f9923f679f771ca968506da1b128
-
Filesize
898KB
MD5530c8d510535e62fd422303538b7dcf4
SHA16287ff30b41766ae4a5a78541581ed683bba7a30
SHA256ebac1e80d8da8f131c6264728c4e1b47091619499ea5f5cbb415736f4135aa95
SHA51251d6e4edf9c38901b966feaa8e5e4c73662b95047f19c77d2640b3a7db83c18f74b09cdc5a025ea5a45b9fd58cf61d343f55945f77b0c1382baf4d94f9e255a6
-
Filesize
1.8MB
MD5b58725b0a514974aae36a20730adc4b3
SHA1a99eb4395fc9a95cad952a7d4bd444fb3baa9103
SHA256a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76
SHA51221ed4926463abff571fa30161607cfc58ef2106683295830764a6008d9e6c1228271966c951c030b13db295217b7f568797ebf74fb02a4ed86d198a34d9b7a29
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5128e5eaaa8937ddf596b7aede4b25813
SHA185afad7e1fb57f692721348079a78383fc08315c
SHA256ce3f02c6eefacad8e72f8a26c94b8f88b23b8fa4aea488c5ee712c6567143ace
SHA5124d459c388adbc2d464411fdbd284f42d755bb1c16a3e91ade345fecc86e1e9129e24c64f4ea1513b49666cbe4a5c1f913d16f1c30e9890a906ba90595c5f85b1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize3KB
MD5930d9136b86894bdce304a3b51a1f04d
SHA1a950279ab19c90734c8500d5c767fe0bc1f1c09a
SHA2565ef333e7fe0cc3a20c2ca02f0d740d137284cc7bfab002c680af2891ace6aca3
SHA5123862544cc399935b04931f5301cc4bde2c052f1ce29d1fedcc1d3e648d409491659cbe0c6ae85ed26c30591334a3bb289cd9030337f32e0b21b92e9f188b3a3e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\70eb1cb1-f5d6-4389-b5d4-7de3b7f57eb4
Filesize11KB
MD5e42bc4e14cec7246690a0d8fcd2d2522
SHA17c8a1f01119b8599ed273bc5b8efb860d180e972
SHA256d9ce8941ce1d07554484a75933b93aea9e1abcbad884d043e9a91e6a248ce93c
SHA5122b4ce0c19d8b000e8b3c2e96777fe1f60b34cd19bcba970a01081bc1ff7a92c5c7d792c3bdeb5607ad1f4b9386f6bc9400f9d3ca3617c1ea630134b01cdb12e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\af8847bf-6239-47f4-b9c1-3e7e98e02954
Filesize745B
MD57f078c5fd4c98672c97aa0473574b9b4
SHA103cd5473bbfe94029228e2fa52d93039fac189a9
SHA256fec37bf2e46a8c0259d57900c1a1b79ffd91062b1a22ab3ce90408eb258c377c
SHA512e5ec56185de39ef8eb729aad26aa6b9ef9b7485a06160d1c6fd52b21938cbd4073aeb7cedd8ae73e0d3db263ca0ba4762c52d4299f50c7cbc1ec059e8fde3c18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5bdb37832b710b7a5902a383a8a52f3d7
SHA12f34762ffaddef31e608c0d26dfc529a49814c74
SHA256a5684441520857a23a025fd74653cba35ce3f0b6e8c3cf0e03b6dde5458799b9
SHA5128f95b663ae975f4c33c5ca84ca4dfe5c7e715fd5e542ddcbf8e3b5fd0a4721aaa2f3e323af4d98a4431ce46a366163040cc0bd33ed97dffe960896f5a76a4af6
-
Filesize
7KB
MD50083054328ecf18376aeb114d7de4c95
SHA1820b9bde5847b83ebc174d5663ba5b66d2cc416d
SHA256cc7b73a142cbe2e1504f4771fcefeac0f7369e55cb058b6f72ba930c55fd15dc
SHA51222559949ba31e131f6de58940a4a32fe30035c2aa49fadc5741511f0e03cb5c2b94f334210406efd670e850ffea7fe7d4361ac49cd26ff720c88137e004b7fec
-
Filesize
6KB
MD5ea9831e1e49f76e463fc9e4b8485caa7
SHA17d4e64003e7b680df6c62a6f712415f65bd082ba
SHA256f8e88a477928f776ed4fc0a3a7624c7278ba6c9470a4830583c128e13b7be1c6
SHA51245eba9cc9271a9368114ab7898420be2e3a4bfc2bacb9631f2723c348103c19426dd4b3a5f56ac2e7516e3f0a2866fc0ffa61ffdf96709f4cca4247a84afbe33
-
Filesize
6KB
MD5d22db2480dee694b6f72982f4c755f5d
SHA1c0eae79b3e3264ec9d20932f7b42c46ec96b4fd8
SHA256e56a1895b2559affac31a2bde76fb4f01fcaca7f161c80169ae3d29691a161d2
SHA512cc31b9309bdc0db5a80b9ff4a17b0b271741dcc68d581d3b0d0541456b927e4eb65c5adea3c7cba0e7e8d32ebed737d1dc98abde63489c5a3872d1699a79759b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d559be8eda560e54f5c504154ebdba8f
SHA1d95efb5c7f4017d6a1e36796e8de7429e5eeedbc
SHA256bad58dc5d7c93bff80272fc1b6bfdd47568a90cc8b17f4b9dd7a7458c11359cd
SHA51200172e9c53d5ad30fd57d00fc02dcd793d2a9c37e717275c806f05e6d3427e2c5e89d21d266cc6a083df22d8e0a0a37f5c01c467ebd0afad5cf0b7161522549a