Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
8s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 18:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://224.0.0.251:5353
Resource
win7-20240708-en
General
-
Target
http://224.0.0.251:5353
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2904 chrome.exe 2904 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1664 firefox.exe Token: SeDebugPrivilege 1664 firefox.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 1664 firefox.exe 1664 firefox.exe 1664 firefox.exe 1664 firefox.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 1664 firefox.exe 1664 firefox.exe 1664 firefox.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1976 wrote to memory of 1664 1976 firefox.exe 30 PID 1664 wrote to memory of 2180 1664 firefox.exe 31 PID 1664 wrote to memory of 2180 1664 firefox.exe 31 PID 1664 wrote to memory of 2180 1664 firefox.exe 31 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2732 1664 firefox.exe 33 PID 1664 wrote to memory of 2232 1664 firefox.exe 34 PID 1664 wrote to memory of 2232 1664 firefox.exe 34 PID 1664 wrote to memory of 2232 1664 firefox.exe 34 PID 1664 wrote to memory of 2232 1664 firefox.exe 34 PID 1664 wrote to memory of 2232 1664 firefox.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "http://224.0.0.251:5353"1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url http://224.0.0.251:53532⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1664.0.1419965551\1460059472" -parentBuildID 20221007134813 -prefsHandle 1232 -prefMapHandle 1224 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6e4f021-88f7-4b86-8d4b-6ee10a81b816} 1664 "\\.\pipe\gecko-crash-server-pipe.1664" 1312 14407558 gpu3⤵PID:2180
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1664.1.1209943489\1378651600" -parentBuildID 20221007134813 -prefsHandle 1500 -prefMapHandle 1496 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d10ddd66-2be3-43ac-a842-e061a43dacfb} 1664 "\\.\pipe\gecko-crash-server-pipe.1664" 1512 e72858 socket3⤵PID:2732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1664.2.992206581\1213737822" -childID 1 -isForBrowser -prefsHandle 2060 -prefMapHandle 2056 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b75406a8-fe80-41af-8d16-d4c666203e17} 1664 "\\.\pipe\gecko-crash-server-pipe.1664" 2072 4768e58 tab3⤵PID:2232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1664.3.789446478\1593037894" -childID 2 -isForBrowser -prefsHandle 2704 -prefMapHandle 2700 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4f8a6449-e205-499a-a579-0320b9b563e3} 1664 "\\.\pipe\gecko-crash-server-pipe.1664" 2720 e62558 tab3⤵PID:2508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1664.4.917056813\1495295619" -childID 3 -isForBrowser -prefsHandle 3592 -prefMapHandle 3648 -prefsLen 26450 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ffddc1ca-dadb-41d2-bc51-e2e23b7d06f0} 1664 "\\.\pipe\gecko-crash-server-pipe.1664" 3676 14409958 tab3⤵PID:3064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1664.5.1640467852\476348110" -childID 4 -isForBrowser -prefsHandle 3784 -prefMapHandle 3788 -prefsLen 26450 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5bfa0601-4c0a-4cca-a08c-035951519d42} 1664 "\\.\pipe\gecko-crash-server-pipe.1664" 3772 1f762258 tab3⤵PID:1064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1664.6.1616858702\1167120233" -childID 5 -isForBrowser -prefsHandle 3952 -prefMapHandle 3956 -prefsLen 26450 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {caecacdd-7304-4339-a382-fa3139502f4e} 1664 "\\.\pipe\gecko-crash-server-pipe.1664" 3944 1f761658 tab3⤵PID:2388
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5119758,0x7fef5119768,0x7fef51197782⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:22⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:82⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2284 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:12⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:12⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:22⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1188 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:12⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4040 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:12⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3512 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2448 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3972 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:82⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3932 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:12⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2304 --field-trial-handle=1232,i,10932851611930255764,10141313868170008951,131072 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\nyws1jjf.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD558dac22071e3dd50b3653516dcdf9a48
SHA174c69f9a8009888cb88a3b58c4b9030e8b44e923
SHA2569062b05990b28cfe9a08a43c7938b228b521620cdaa5ccda2fc5e0378d015810
SHA512d48982a9d869f2076d00761db06f98d53b0aa23bdc73349d6e98954a331b80b8331321e2f88bdbf07051000d3ac84959f3c015a3b9eae1ba710b812c1e0cf0f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nyws1jjf.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5646a73829edb6defbec96eb243fe90cb
SHA157fab7c4ce16b677fea8353096dd94aa190aa238
SHA256b491188de73e95be9196717a6ab69f6dad85875cffd0b33a852cce851b0a635b
SHA512bcff699f6b13a31cb626fe77678df6a293f2294cd8495173fcfb87c64ad39cd3681fd1e68a5ed96e619500d3e350e274e16b83dd0032c6cc4c90af0035306bdc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nyws1jjf.default-release\datareporting\glean\pending_pings\4cf1dc5d-f570-4cae-9234-53b6b6694c19
Filesize745B
MD555ebec10b0affdcbc16b424ae64265a6
SHA10dcf01e9efec162b6345dfdba410bb325c13305e
SHA2569c2d61200ad591bdf6e6ee0d59a77482eb061b79097bec6685b824b5dc006516
SHA51222c4a11c0ad8be88454bafa167f78cf01d1c01dd58d1cc235e41fc9c264d8e0c37103f9f54a777d4ea551a33325f8fdb5268b10391681aeb84fe243958836c1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nyws1jjf.default-release\datareporting\glean\pending_pings\651f3681-ca1b-4c7d-a71e-686e1146b6b7
Filesize10KB
MD510092f49fdb1c1ba92d4ec765f25d723
SHA12dd7d014ebbbaeb4528cae9a645810b1b49c7879
SHA256cb9b10f0bbf8345e3b83a1d25d814f0c27ecb4a550027be26a47a430c3baa4f9
SHA512e2a1a5365afd5c540d902a51f836f852e005139f04ca2cf2a2b440c71a8c1a69195d8838f68ef45b9775f22472aae8c3c1210536f6cb5a19954987e23d59f98a
-
Filesize
6KB
MD5d0fce1e98bae58550901c6030c22e816
SHA1d487cebc2cf560e59053f04930443d2ed4abd3db
SHA256b5ed49ba3f13e2504ccf2bd94b4e5fb19eb6d395c5df0e58093891ee900e0f90
SHA5129ecf0186b2c503f3fa9753f39301254f3f30149b0d18201a0487eeb0c14752f6730fe3c8515c5697baae8032a258b8952d4497e290c5e85de58c63fbe3dc39ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nyws1jjf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5976635d5c647b0b46d1fa9df6e8df391
SHA1842b632f8610f19acc40e23149af20f4675f917d
SHA256bf17132476d81b889b3f14671c9082b5c891c22207567c560aca8266716239fe
SHA5129f7ca1ad30c30115ebd0194d50ab26018205bf7dd75c801384d894ebe594d14c0b5eeea6ae169f9e3df8453bc333fdce253199131a2c05ad60bf1c60f60f42bb