Analysis
-
max time kernel
27s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 10:15
Static task
static1
Behavioral task
behavioral1
Sample
ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe
Resource
win7-20241010-en
General
-
Target
ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe
-
Size
1.8MB
-
MD5
cfc385a6839bd19c26bd89c6939cd2b1
-
SHA1
892d11f242dda22bfe070e045922898e1029e820
-
SHA256
ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28
-
SHA512
ddd37d0f847c029ef10a37277908d77f5578423388bada58e803481de81f6fa7b1441829cca5c5be9544b591f56a070c8055dc7e11a03c90deb40b1dfabcfae8
-
SSDEEP
49152:frqu8a0qBKm8TsSt/PQG2JTyL2jdHJnpPRwB:ecBxKsY3CTFznpJwB
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
cryptbot
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 skotes.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine skotes.exe -
Loads dropped DLL 1 IoCs
pid Process 1528 ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a4ad-105.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1528 ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe 2920 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Kills process with taskkill 5 IoCs
pid Process 2544 taskkill.exe 1040 taskkill.exe 1528 taskkill.exe 2588 taskkill.exe 2392 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1528 ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe 2920 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1528 ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2920 1528 ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe 30 PID 1528 wrote to memory of 2920 1528 ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe 30 PID 1528 wrote to memory of 2920 1528 ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe 30 PID 1528 wrote to memory of 2920 1528 ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe"C:\Users\Admin\AppData\Local\Temp\ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\1017515001\0cf7eaaac4.exe"C:\Users\Admin\AppData\Local\Temp\1017515001\0cf7eaaac4.exe"3⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\1017515001\0cf7eaaac4.exe"C:\Users\Admin\AppData\Local\Temp\1017515001\0cf7eaaac4.exe"4⤵PID:3548
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017516001\4af68e4f75.exe"C:\Users\Admin\AppData\Local\Temp\1017516001\4af68e4f75.exe"3⤵PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\1017517001\60ec252f6f.exe"C:\Users\Admin\AppData\Local\Temp\1017517001\60ec252f6f.exe"3⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\1017518001\133e7b21a8.exe"C:\Users\Admin\AppData\Local\Temp\1017518001\133e7b21a8.exe"3⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\1017519001\51ce94e800.exe"C:\Users\Admin\AppData\Local\Temp\1017519001\51ce94e800.exe"3⤵PID:1744
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- Kills process with taskkill
PID:2588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- Kills process with taskkill
PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- Kills process with taskkill
PID:2544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- Kills process with taskkill
PID:1040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- Kills process with taskkill
PID:1528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2860
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵PID:1952
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1952.0.615573481\1209693945" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1236 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f4715cb4-6e4b-4f00-a814-47bae87f47be} 1952 "\\.\pipe\gecko-crash-server-pipe.1952" 1308 107b9858 gpu6⤵PID:1816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1952.1.827539806\1097629695" -parentBuildID 20221007134813 -prefsHandle 1512 -prefMapHandle 1508 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {22f339c3-1a70-4872-93ee-1b359c026490} 1952 "\\.\pipe\gecko-crash-server-pipe.1952" 1524 e73658 socket6⤵PID:2280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1952.2.855613781\2124001500" -childID 1 -isForBrowser -prefsHandle 2084 -prefMapHandle 1972 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 816 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {19a2da8d-bdbf-44cf-9d36-187c220b3da0} 1952 "\\.\pipe\gecko-crash-server-pipe.1952" 2272 1acb9958 tab6⤵PID:1940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1952.3.1577831561\1292933456" -childID 2 -isForBrowser -prefsHandle 2924 -prefMapHandle 2916 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 816 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ffbe7d63-d13a-4ed2-bd23-49dec90629ea} 1952 "\\.\pipe\gecko-crash-server-pipe.1952" 2944 1d26ab58 tab6⤵PID:1364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1952.4.1287624163\1250363229" -childID 3 -isForBrowser -prefsHandle 3616 -prefMapHandle 3504 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 816 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {83227b8d-3e9e-4144-be7d-36e8af552213} 1952 "\\.\pipe\gecko-crash-server-pipe.1952" 3652 17d63658 tab6⤵PID:3200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1952.5.1960370983\546207506" -childID 4 -isForBrowser -prefsHandle 3760 -prefMapHandle 3764 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 816 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b69135c9-5125-4101-bd06-255e43dfd851} 1952 "\\.\pipe\gecko-crash-server-pipe.1952" 3748 17d63958 tab6⤵PID:3208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1952.6.2138017383\413150808" -childID 5 -isForBrowser -prefsHandle 3924 -prefMapHandle 3928 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 816 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2444976b-0f6b-443f-b29a-7aee5864a21d} 1952 "\\.\pipe\gecko-crash-server-pipe.1952" 3912 17d63c58 tab6⤵PID:3216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017520001\03d851b01d.exe"C:\Users\Admin\AppData\Local\Temp\1017520001\03d851b01d.exe"3⤵PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\1017521001\c63a7da59c.exe"C:\Users\Admin\AppData\Local\Temp\1017521001\c63a7da59c.exe"3⤵PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\1017522001\d50efc6cfc.exe"C:\Users\Admin\AppData\Local\Temp\1017522001\d50efc6cfc.exe"3⤵PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\1017523001\e2ab7759cc.exe"C:\Users\Admin\AppData\Local\Temp\1017523001\e2ab7759cc.exe"3⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\1017523001\e2ab7759cc.exe"C:\Users\Admin\AppData\Local\Temp\1017523001\e2ab7759cc.exe"4⤵PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017524001\9112ef7487.exe"C:\Users\Admin\AppData\Local\Temp\1017524001\9112ef7487.exe"3⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\1017525001\c3499c372b.exe"C:\Users\Admin\AppData\Local\Temp\1017525001\c3499c372b.exe"3⤵PID:3180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5138c1670c3b3967dc06b7ab8a32c3b61
SHA192f478035fec1a66018b83d0f4f9deda70bd71e1
SHA256f7efdddc3fcfe1e4bc272c028d5cbd35849ec9069cbb23e6dd6ce4e5bc8655fb
SHA5121ffeeb06ce95c2b7bcc380ee4c485e270c598f3a3225053c4d2fa00f82e257a5c65415a99cbcc356db5d17c41082de6468f8634b8826151787585230c4d24ec6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
3.1MB
MD5c00a67d527ef38dc6f49d0ad7f13b393
SHA17b8f2de130ab5e4e59c3c2f4a071bda831ac219d
SHA25612226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3
SHA5129286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca
-
Filesize
4.2MB
MD503ae071235d37edc3ea30848462bccbc
SHA1d8425df6c157fc8699596f64a0bf996692ebc947
SHA25672662d9e82835cb7e3210889828befd75dd7921c8bb6c45f5757c23602432536
SHA5122ef13be57bdebf61bf59e7b39a5c522f91ddb9d003a1a9a66b3fa9c7ef35ead57626858050ef2615ed87da4a32759328121e63fb46b2b4ce2f949caeea8871dc
-
Filesize
1.8MB
MD56e97405d1faad641c284ffbaf6d8ef86
SHA18c3c9bacde73d28e58f700b71a7410e0cfce2d2b
SHA256348cd9077700714a7810bc7459eb708f5c0077db50ed1603c0b988d6c18ac6a1
SHA512e6a37a3e9c5eb8404d84860efd16b19c6eacd6d8147aba0babe083258293081cb8faffb6dbf7f55ea606e7f7741b3f16608ac8a6996a0b34416cb7e4a535b40e
-
Filesize
2.7MB
MD5f6c52a4dc3fd9e09bedd4f46b2128286
SHA162645d6c5d31e3231a9b6c623ce9977ee682086e
SHA256e9408b42c1db1ab5b6bdcb0663d90fa868601bc75f207f004d4cd072f48560d5
SHA51247a68c788c70f41b1c0cca35f0a983099b23ca547db0ee81ff3248be85f712a75e4eab2fea885b81266d2dc96acf5a5be5852e70363d5894bce004f7065ba273
-
Filesize
945KB
MD52252bd7350c2fe134502098fffd3fe0e
SHA1cac34836fb85e204b1c339ee1e8e40443c03386a
SHA2565d0c43f6d6c41bfe8231be3c771cc1f4b1018e7ccd25aa5bf96f371347318e6a
SHA512617ad60959767d481733f0a80709e863648fd4e1c64198625db0bca94f002d48e2b2c2ab145384f349e6d12f045006f0130f7acf1c583b89c6d69465dc638a6c
-
Filesize
1.7MB
MD580c7f6ba56476f282f1eb23421522f83
SHA1325816fc1e9a95a090caf1b1aab58599c735e68f
SHA2565ececd92978f414895b062a77afaf279d45746a7fa6a341a38ff9358958bd2ac
SHA512acb03c8e6a7f450d1238564c93b3fb8f76e6a0622e09777fd55194b06ff409feba480495b893fe44de6299ea4ae734c114e0caa2cac9050cc08087d0d2a4bb30
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
4.3MB
MD584e0e622857460da96501532a233c862
SHA1a83b246ef32b7a66a8cbbc54edd3bb667f956b9b
SHA2560924a04e22be1339356c24b69b2e75516c56b0b23aa500e9068b9c28c54dd5b9
SHA512db686ccaa7ed5c1707f18a9482257ad1b1f9101be0d3e975b4aa18f6eec5ed1860aa881b21f9c8265a0ac58c39becf433fff98de874c364b9953eb542f12d1ce
-
Filesize
1.8MB
MD5cfc385a6839bd19c26bd89c6939cd2b1
SHA1892d11f242dda22bfe070e045922898e1029e820
SHA256ecec0c611efab39581ff0f90acb4044eb659c27926b7f240dbbea1d4be3fbc28
SHA512ddd37d0f847c029ef10a37277908d77f5578423388bada58e803481de81f6fa7b1441829cca5c5be9544b591f56a070c8055dc7e11a03c90deb40b1dfabcfae8
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD57d2fa92126666a7a3433654609676786
SHA13a92b96bac4303146f0d8f05c41590cbc7c255a4
SHA256bdd6ded4f4a9857f5a927f1b3a97cc925cc8dcb144ad838506d82e5a6aa2b859
SHA51260a89762f6053194bd4d555266f0aa9bcfd0d8d43991cc76aea227a8e850914ed8e28f7dbf100421fe14072740787a533c318295876c9d375451fbb16bfc782a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\60873c06-a0d2-4172-a0a6-974fb868d1c6
Filesize11KB
MD562944754ab44d079f87b7fd70b074e50
SHA150f528ad7a28b432308e19af7c13adf97def24cf
SHA256521856a28fb2a23c7ba760e999713616e638ad9e0cfceb3ba91043f8c2aa4d3a
SHA51297eea6b2875f0a97a30f59a3920cc8aa7cd641c436207c09672f44453bad444f00444eb32741dd05675b774936a84f017fcd3494ffc3f7f9d0849dd13deae438
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\6a26af50-34e0-40da-b6f0-e72cdcdfc0db
Filesize745B
MD5446c6637054b0283bba6e241c45e9b7c
SHA167a9abbc9a669def6fdca15c596a856f710b824a
SHA256dced3591268669a1497c881631eafa40ae5418444aece17918c7c6d6b0923c10
SHA51230606b9ba325de6f0555f2d2d832665681534806570eb444a76d9c537939c6fc32d5fd9cee8fa3748dfa45e188f2f0b493072528973d4957268eeb23fc443f27
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5217486ab4387d90b864b64f16956adbb
SHA16b90f5a3716b34e0bc328628f47ed8cfa2e12cd5
SHA256062774951aa139f51e99e2b51c7e0d3d66fbeb1c5f7b0790605e59eed30aea78
SHA51278c4724f5cf8caac226bd5a6ea76f55a22a44878361984635f39665b556ee577193be7ec2ff42c22f04aa9d0178f59374ff367433fbdf993d8291d39e6325126
-
Filesize
6KB
MD51bb125b165a93359033a6430ffa9a15b
SHA1912a0eabcaed1636e26111c56f4ac6269b7be6d7
SHA25634d71af10b4271f2f28eef1fdfcd0b687d42eab3e4811adf898475b88a6450bc
SHA512550f2212914f9d1398f93bf4ae247bff2228131790d24ccfe58d953ee6a2bbc62cb2559f0f7eaf12032640bcdc76c5c5f877780bb7a47a5713f815b9ddc6bc1f
-
Filesize
7KB
MD5af4b461505fcf7dcea97779e0e9f8cb2
SHA1d49394f490c1a90f8b11575363a89751213a4e1d
SHA25685b3477cce226fb42671fa62030bc008f779b21e015386d3d7a22103d1d19ff2
SHA512355bc2a6d88672099bce940cfe4ee112ea81cef9b58569eb183c3b3a1f390c00bd9df781fa51370fae5ddbc56c9eee19c045b7f9ea82afade81d442c0575c8d2
-
Filesize
7KB
MD56d60661dc30b8d11d9f39dc0447011c3
SHA1e5818565b4fc4acf352db4746183d0f740c6ed8c
SHA256972c43cb7537dfbee4753632e3ef8c211949652a288a58c499df14d7fd7bbb33
SHA512cb75b3b4247ddb0525855a35949f1593e5b38fd8e4fd2c68d4560e250f5a4de245e4373bfdece2e28835f83233c5ad7f5eb9e92073c381ca9d07be7d02410b83
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD55eec297487766c84e0aa3496a8ab76ed
SHA121b7cc9a4ec14b9b20fbe54962aa2b9ca8f7ec95
SHA256a1699d8103f756567e0f33e3036d888e871f95ced9d87caaf0ca0cbc63d6ca14
SHA51240e74cc943c8c2cab3f765679347b4fb9b4fc38823932e05a06519d35a96fe6970c56c61545d553f5721012979bc58abdd25f27477a2d78040996a1bb7843656