Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
CryptoLocker.exe
Resource
win10v2004-20240802-en
General
-
Target
CryptoLocker.exe
-
Size
338KB
-
MD5
04fb36199787f2e3e2135611a38321eb
-
SHA1
65559245709fe98052eb284577f1fd61c01ad20d
-
SHA256
d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
-
SHA512
533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
SSDEEP
6144:sWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvC:sWkEuCaNT85I2vCMX5l+ZRv
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 4708 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Executes dropped EXE 2 IoCs
pid Process 4708 {34184A33-0407-212E-3320-09040709E2C2}.exe 1576 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 200 camo.githubusercontent.com 286 raw.githubusercontent.com 199 camo.githubusercontent.com 201 camo.githubusercontent.com 285 raw.githubusercontent.com 287 raw.githubusercontent.com 288 raw.githubusercontent.com 197 camo.githubusercontent.com 198 camo.githubusercontent.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133674481904128573" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 212 chrome.exe 212 chrome.exe 6060 chrome.exe 6060 chrome.exe 6060 chrome.exe 6060 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe 3188 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1204 wrote to memory of 4708 1204 CryptoLocker.exe 83 PID 1204 wrote to memory of 4708 1204 CryptoLocker.exe 83 PID 1204 wrote to memory of 4708 1204 CryptoLocker.exe 83 PID 4708 wrote to memory of 1576 4708 {34184A33-0407-212E-3320-09040709E2C2}.exe 84 PID 4708 wrote to memory of 1576 4708 {34184A33-0407-212E-3320-09040709E2C2}.exe 84 PID 4708 wrote to memory of 1576 4708 {34184A33-0407-212E-3320-09040709E2C2}.exe 84 PID 212 wrote to memory of 2716 212 chrome.exe 90 PID 212 wrote to memory of 2716 212 chrome.exe 90 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1296 212 chrome.exe 91 PID 212 wrote to memory of 1512 212 chrome.exe 92 PID 212 wrote to memory of 1512 212 chrome.exe 92 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 PID 212 wrote to memory of 668 212 chrome.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CryptoLocker.exe"C:\Users\Admin\AppData\Local\Temp\CryptoLocker.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\CryptoLocker.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9cb14cc40,0x7ff9cb14cc4c,0x7ff9cb14cc582⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2084,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2232 /prefetch:82⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3736,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3720 /prefetch:12⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4820,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5032,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5188,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3576,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3396,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5300,i,9604586342763998708,4857948521675336420,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:6060
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2616
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:1684
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3188 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {47f366e3-1002-4c9e-a066-3385dbef90c4} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" gpu3⤵PID:1868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2404 -prefMapHandle 2392 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4300265-b991-4960-9443-800710febb9f} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" socket3⤵PID:3608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3196 -childID 1 -isForBrowser -prefsHandle 3216 -prefMapHandle 3292 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 1316 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {49cff6d3-f465-4018-9118-7f20ef0b6e86} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" tab3⤵PID:4044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4220 -childID 2 -isForBrowser -prefsHandle 4212 -prefMapHandle 4208 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1316 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c8d29ca6-3e12-4164-b9cd-ac0481ec9e51} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" tab3⤵PID:756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4804 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4832 -prefMapHandle 4632 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e3be8e5-dd01-4c74-9da7-768244a434d9} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" utility3⤵
- Checks processor information in registry
PID:5708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5240 -childID 3 -isForBrowser -prefsHandle 5232 -prefMapHandle 4016 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1316 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d9d15c0-bab2-4981-bbd7-13fd19d7516d} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" tab3⤵PID:6092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5408 -childID 4 -isForBrowser -prefsHandle 5420 -prefMapHandle 5364 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1316 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5d5e6b6-a0c2-4319-9c00-1466b6be6d63} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" tab3⤵PID:6104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5592 -childID 5 -isForBrowser -prefsHandle 5668 -prefMapHandle 5664 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1316 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e16dd00-de49-4930-aad4-bbb148563846} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" tab3⤵PID:6116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6080 -childID 6 -isForBrowser -prefsHandle 6032 -prefMapHandle 6024 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1316 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b180802-1e06-446e-acbc-9e6662761d95} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" tab3⤵PID:5640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6260 -childID 7 -isForBrowser -prefsHandle 3672 -prefMapHandle 6108 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1316 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {028ddd5d-4818-470b-95cf-09f13f66db66} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" tab3⤵PID:5400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3668 -childID 8 -isForBrowser -prefsHandle 3592 -prefMapHandle 6272 -prefsLen 27998 -prefMapSize 244658 -jsInitHandle 1316 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {493664ab-dbe6-4e1a-9f0f-2c82d9e9c76b} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" tab3⤵PID:6088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6416 -childID 9 -isForBrowser -prefsHandle 5252 -prefMapHandle 4480 -prefsLen 27998 -prefMapSize 244658 -jsInitHandle 1316 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e52ddc05-4358-4980-9aa3-2a3001dc74af} 3188 "\\.\pipe\gecko-crash-server-pipe.3188" tab3⤵PID:4552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56bd270b083b24c3877f5542d1b387f02
SHA15705fb79170d284388bed470e8178217c14c193d
SHA2566e6ffd04c0d092cca1b3a2ee6c18cad1ccd3ffb91cb54e25e64ed7c88c650b2c
SHA512635fbfad0ff81b08e82905525dc982abc9bc04ad9a9935ef9e19d7bacddb5831f5fb72843cfa28bf2324605512b4e0c3e2cf6f39f22b10e0924a78f6aa590367
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5c6a62c76db385793382ce06b3b09e603
SHA1fda11ac1476a0ccd2abbd83964e6dedf6432d101
SHA256c9bf284c9a5e10e4f8dc1315492d709c1be0d8e73891a89afc34bf7c1412d207
SHA5125cfb2aab959118550c4e5c30443bdda66934d716a20cf351d5b446e0e00895a91f589d1fbca4b3448592ba0f2e9124ccfc2cf1f39353cc0b6253cf462efbe7f8
-
Filesize
356B
MD52b377ef37a7de3b857fcd105feb14ba2
SHA1610047370b78ea123d6fa5b522b742efca4079ed
SHA256d81f1ccf958e814b72526f3106b1065be9f3013da20db4f2ca16117b12db2ccd
SHA512f765b6a7e1b131c0bfa00d20d159ae7b79ae09000abc223c31236e337b31c6755622f26f1e93d92902abed6d4cf97c22a784e45e03a0ea8b7f2b23d0a98ce778
-
Filesize
8KB
MD55c7867b66b3807f985dceacd085cf2b6
SHA1020fb0e6365a0ca1ed14cbcacd66a31ca0a330a2
SHA2565fd85e78101bac351586c2084595fad4cef8c8d9e804ac722459bb6abf2c7dd0
SHA512f958e0b62bd27cc4358371b1ffc36606b8073ded8658c276feb93bac72ae10b0a68e7ae5fe1127cb289609b6ce8d72282722f4c56c3f3a81f32f7b9471acbb99
-
Filesize
8KB
MD5129c59be5947f165029ac98b865e7da9
SHA16fc3ee039f33a673f92afc9c2d86deb46acead88
SHA256d25bcf861c558ed7dbf8f0c5a17d32b4ec720e333a1503e8238dd9bc80fb7cfb
SHA51231e5ec386a0205e94ee13a51e9efd42927cb85a7c9d46d014b9e32aee236c6eaf77bf987e0481a20c9f27a43f98c415252a08b1d57baaa03909124b5ada6acee
-
Filesize
8KB
MD56174bba08781859e944b23570f079917
SHA13119d8f884fc14765d98a812d91261e4a6401947
SHA256aacc8345f804389be389e29423c3a6c40173291754626042034afc6953e34afa
SHA512c8f9d3c68ec93d0e1d5ae8d5995f40493ae507308427f034500ae8f82b276ad830139232632b3cdd46f93166cf120483f303ada5fbbe62fa4b0e96a53313e4cd
-
Filesize
9KB
MD5fc556b37520d54e844f7ee8529b09e88
SHA1f1739ae44cba01623e9d48aaad2a2c6625d90f14
SHA256cb233c935433821b70331554f36598d62bb3944ed367deffce1e373aecae9fd3
SHA512288bcd9253aee3f599195d20b3c21d00ea329053e2ac90b3e0299a0b7a41699752d553219581b2888f85e9a92425392faeb1f0089e509c6c6994b3b6327ef594
-
Filesize
9KB
MD548770bf0add2036efd7b5fe2911ae9c5
SHA1926a4054f7319e94016d50c5a3ce48ac54b009c8
SHA256c520fc07a1236aa0afc0e95a3c8cfc226563064e7951a2e86f631e68a4c8a8f3
SHA512ac2802e9c27a94c8ef5a006f60b4dc419c56ad2f3961b4b68e64f1e4f58e2732a145213211fe531ef7f508838b7263e92678e7fda1756cc907e55b8b502ca666
-
Filesize
9KB
MD52630ea293057bda1cebbda40c1386afb
SHA1304db73a280e5ddd1910ff74b86fdc278d1c7652
SHA256034ddbf5f63d4a90c19d533e9bad67cf3bf0b561efd87a9246beef2e399bb321
SHA51264da68b0912db40a3e7e2fe68fa00b2f29b32164ef17f54136e9a98d8dc09b66dab86c664d6344c3b29e536eaf78648b149f6829e2b52d179b8b2a34ebc6c645
-
Filesize
9KB
MD55883d227e0e8753779487c6e33d843f0
SHA1b4facf9b67adf1c11007883c4e3746abf882902d
SHA25683b07c1a2c849526265d419c78b12061e74135f197da37c742a5f57a17445bd3
SHA512a3618ac9b2c0462b531ad80f5436725b5d571c7f2a2227021cc7f048512159f89ea7b822c85aa7ab7919b2b7c35042200e17b052b6eff8c6d39aa79083b0efd8
-
Filesize
9KB
MD5b9dd2a53e256fedd4665898ece8211d2
SHA1b77b77d9a5628022800024fde699427608e169ce
SHA256b7ff20b0589fef38c28b10c7fb3d9cb9cf343c04537bfd3d8739332071aa98df
SHA512ef7d883ad56956c7a4743e8ea9ba2cbbde75a4d779be9c7ea5a521024901b91aa20320d04bdfb79be05e5aa3ee85bbc8dc499d1af11fb380b34e1f15be488980
-
Filesize
9KB
MD52fbd0156808511969705492e6490c162
SHA13a0f6b4a6edf25fcd54b3ac65a755713c0bdbc23
SHA2563ff789e24c29609c42d2633fc99fd6caeffa9ed9a63af95a45b118a8abe31ec7
SHA512b2a77520a5e94937567ae0d61167bf82c103a7208b2d7bba6c4a7e02a9d05ecf35d8084fc547e8934667309953e489191a5d497a8043e3e345556307956f4f40
-
Filesize
9KB
MD54b90911430ae0d2098013b00b956242b
SHA16e979bb09f609aaf2a568bbb1b0c4e3f24b28b7f
SHA2563cfabc6089bc2f5ee42d20acf2ffcc69910acdf9f172997161b61b7cbd64124d
SHA512a52469c7746fdf4eac1c26c67666aef0b7ce14eb69d7d612d99676e4532e4f2443f351366f3b70fb63b09b4480744f4045b6dd8d79c299e8926b562210863112
-
Filesize
9KB
MD5fe94c3016bd9c6b716564f4f3da6fea2
SHA19805a664568f9793671635de074c6fec86fd0f24
SHA2569cdbc16e372a94e998d4236c3dfced913ba6bc2af21d74a8821f8d292f46db2f
SHA512b8ccccac2230736ca32963e589d033612ffb4cb631de8fa853efc639115b454b8fbe520ace1e6217cacc8ca6d42669d84f29016e5813e6cf0c4b5b0f6aa069ba
-
Filesize
15KB
MD5034404d740c3b759a5a83a96fcaeeb3d
SHA15382f515ac118bbf9354b72cd2615d3353b1d2b3
SHA2560633fb04cff544fc946e9a51b32e267cf897937a64275ca57b2cfdd0da4ea12c
SHA51256046c5d0e2cecb94a5197eded30a8802cc06e9c057294886a1cf86a05635cffc884179c78c85cd860bb958aae2ca50731dda3811f9a0b5b81d6d88cf4d7dec0
-
Filesize
194KB
MD595c5c9308619a20e187e2dd004f3ab48
SHA1536770b489cff3dd312978e7874bf4ca3b67ce35
SHA2560d62cb95758f68753495d724e19ac7baacaeb6d39f746b68b94afd1d7b3a7b2a
SHA512558cc9d9fee565d8df7574315f2e4a6eef06d35062a2361aeaa3a4ce6b28431b9192d40ca727feaf468592752395b7b555e75ebba3aa57158341986800ea54c8
-
Filesize
193KB
MD51e7497d27af7316524225d04222888a4
SHA1207302b5fa9ea074cc80c24e80b42410a4f420a3
SHA2567b94d2b039b095d8f6b1d75f49684436304b0be30e0979dfbc7f9a0a429419fd
SHA512524c37801c761183cf0b4730687931f89a0e25f604783033fbf57b7e1959209f6cff810c679a6b1ec80feef04ace58b0815e3d3a79cd8a78bf198dbd22d1c512
-
Filesize
194KB
MD5eafcb8d769cec9a68780878386d2959d
SHA1c78174f927ee06d265e426e0cb4da6c854bedc1c
SHA256b53616d5f3c47f00f784379ff5089e64ba8b7df04e9586a5291cf459795948a2
SHA512e5d0ea12e51ac5680baa33af06265e79fcb0a16299945a0869efc1185d14b5e39bfdbaea26a9cf4eb95366fa4d63efaf31f6214ea1dc0332344b330d2712c0af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD54aaf4b3a5e2eeb22f9417a085888bdf8
SHA1115a7a82fe1f325653b5de3bcc7cf1ceb749fd71
SHA2565cb67a5df4da1c20a18160ce3a76ed68cf08134ab603e025bca7e2209ae96520
SHA512cf7765489bace18d0c2658999f70f82fb6a505ad39d05d88accf804d705c1ad0bb5450ceea8b39aaca8a0ff7170eac36857a1c4aa5afb0d0f6ff26efc4f9abc6
-
Filesize
12KB
MD58d1e601dc0c12d32ece614af5c3b3f69
SHA132efb5aa0f8c9055b0eb57a7fe8369c1fad2988a
SHA2568c91e02c7e21ced8e3de9cc544b60dbd6d0df17a3c1b2376ba687d4c37a02dad
SHA5127ab5ed91cd9e0122864377c6f96bc8dc499958b184d6d00adf244e835b469c341f4d8e9a6ac377bbc928ec2e16d7d686e68a06f7bff42f309f5f3e189dd54cfb
-
Filesize
18KB
MD53757255d8c2716b34a127ee204d8f68e
SHA1d1523bb9a2880840e1e3316f8f76c9d72f0f09a5
SHA256e32a844fef97eee8a77053813f83f174b06cde9dc90d6aa45bcfdcf6e5a2b450
SHA51251f5f0e46f7fe7e2bd815d27d414d10565f530fee838db018b18a6192afa801c47cbf7da5a836676e1b5eedc0e52d97c904619b4dcac04e238a5198143fe9598
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\003B9E0A2EAC56AAFE3116E93CC53920DFB930FE
Filesize219KB
MD5159376032999d7b7ffc3f01d43a5dc89
SHA1a1a1596595eb88fe4ad8c27f419f5d2d5584cac5
SHA25614422d146533837f215922a77bb80c741e95418ceb9bb37760d6b1df807e9149
SHA51209a08900db1ecdb6ce5d4938036f790ed97ff37bed98decf230ae632b012fa946cc43b20e4f650849a7e5307380852d7fed573db608d39886d675e1f4a3ce018
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\21816B0DB510050B0FACA059FFBCA789FAFF93A3
Filesize123KB
MD556441451598d6f12921128d2f2c2c2df
SHA1ca4438dde82d06d599c4cd3ced63f9608bf817fe
SHA25662737a1b8bf8dc1b8c6e2ec281e2caf45383bc2119a7fabc6975f3fd0c3bc8fb
SHA512e748ebeaff2a29eb3fa1684e4ee572979138c01276f986d8f5fa1cd649afe67c93d4ad76177ffe39b609f75c002f7ced6ac119b24862ee6cb098797924dc35ed
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\2492994A253B970917AF5CDF605580B1C2DC16A0
Filesize791KB
MD5e91423caf8fef0314bb01bbb7db295e6
SHA108560793c58eb03e4c8bfc9082aff7db517ce1f7
SHA2565c177859161c693c74f32f2913156dff16fd276b6522244b39b4678d2d1732b8
SHA512ac0fbd8576e6ce3781cdf494fca46d9c4aa26cfa84316c0448bd42f791260cda956da7eb6070aeb5f00e151d03dfac8791958fd840e4cc13b3ca8f7d9c2bab38
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\2587B8254FF29804EA8C313AE41DED8329BBA421
Filesize86KB
MD5efd0fae7717e7baf75a5818d4d2605bf
SHA12ded87918713ea930951500b5a21af10f2521430
SHA2560c15ba9754d5a28bc5aa721548c6fcd87e4d1caf0a4f25c0823e5b0897bcc308
SHA512c33bf140d25da5e0c3a2e310977059124ea50c1d9123baa5938d2c10c15adb91f115d8c95e4adb33c71523ceef2fc4e86b44f3281cf530a91b26304c5af75dba
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\2E8A8E908C5BAF7967BE93F05F38CBA147918556
Filesize102KB
MD53a14f279785507573f63d9dfe1da3450
SHA1a41317c6d511eb153e827ff2f47bc8f82ac07415
SHA25667d66406159e1bb37c4d337dacdfaf9ccc7b0c25724b2e6aced0746ff780b43a
SHA512a421bc849e26fa175b24bed24c5950e7265906609aebb92541d489c556896bbf8a149dab5015fc3522b77c0e33469979b8b11076f53c7143d02343e618ec8efb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\5BB66A8F6778DEB9D595D468945EFF9C7D66B934
Filesize68KB
MD55fb0527474a0184ab380ae9865a8a84f
SHA1c96c09734a36ddd2e82884d90b9d9ffe5c5ba833
SHA256f947b18157da3ac1e2800321510293b7b87d0d2c8658cc75f6e4a161336c8f95
SHA51204258a8b8cc388376cf7ea6e7fde1ce39bd6f1422da5b579595a8da79f09418c63145642a161b92e6ca8c6fa02ca6d67c004ae6b5d78fcb9f091a2c98aef4d8b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\6F56E93B4E08BC847CB93B94DF4759FBBEEF85A7
Filesize162KB
MD56fd4ead126151e02ab8eac7b997e57d7
SHA11b4707022e7defaee4fb4327d9192b4f232a579a
SHA256f9dc7bb5d5164f0acd7dfc51be0b2b08e014fa6592c462d8443d91489072cfdb
SHA512476c2f8bd7def3745ec15165be13027249fa6239d8946956ec78d528568b7b9955b3810f62af596a036fba816935a3b2f595e905fca14d6b0b72cbc52522d0e1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\7FD2E447348A399199F0E593753118D660C52C19
Filesize93KB
MD51e989381e235ad856d80b82097505968
SHA191fe76c6030feb1b8253c5f9204e46a204223b7f
SHA256ec9914511137dd785a58874c49a34a34fc9d86b108d06dda24e0906d80bc5a5f
SHA512def8fe74fe80c68ad5002fed280122bbf2d6ff19512ec6155174cb8b2c36d5eb289af2766ab5beaa3673b5107d056dd737a2beb93088b0ef1396c77baefb0925
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\8F2B50ADE38DBEB7F4A4E85B4AEA9EE28AE93B76
Filesize2.1MB
MD50a71d19d0d21c669fff73c947ad0b404
SHA11c4f2dcb0a76399106bf4c556605e42ddd9d017d
SHA25662ee83abae7abafb11825de545d540fd23c5abdb9d93f47773dbde54231b2fc5
SHA51248dcf7c0c5417bb1bab38595620f5c27c2e15f8b98d7ef577d1c37ec1423841452b9f9974fd6b1f800fc65a50752f62d3166d19401f12c241e427004fa6ddb63
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\A2BD72A3227572715C6CBC7E489B8F9A87263541
Filesize79KB
MD58beaa5d302f6f8e4e53dd878a6096543
SHA16e68c8c37bde9887e44ce8e4d2e7d0b0be50efbd
SHA256c6c616858e5112b1183519099a1eef11df0d6cf09591e39f9031dccb85f1025a
SHA512d28313d47cf6db6a6cdb7308aaec1cefc796f833239635297845fa213efe2a6170cb3fa68245b1db53d9a1892176fb5065d172622f9907468eece9b2402dc882
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\AF6E7B7DB9908D7B867517AC33D094ABD56E38F7
Filesize81KB
MD57865a154b51b2a92d9c7abfa0ff01864
SHA164a00684be6e320eb46f547ec474a0235289101c
SHA2560d42d1011a732687261d6328c7dc21c31f77298f94afb70da7d133c65f9acfa6
SHA512624e420ad76eee7761096386cb661268c95a62d8c0121bd9bc8ef971ad0c6c453dbbdf83d30f75596bbad269871ca08051c4747da68a937b9fa1aa5eaa60d640
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\B47C2290387CA81094036091C984E8DF3E89AE1C
Filesize79KB
MD58949f83c652938ff3f174f346e5ff1c9
SHA10aac58c91510223c55760e72d2347e2978144757
SHA2560b5ebce57b80d1486f0cd34878e16879070b147d1bc6b52ace6759d6b99b5236
SHA512e79fc296cb8421cc9e17e855daf92feea1660711eb181d01827b51fb7a96a6c821fb78a1218966b87f7fcc24aae2f7aff0486614c0e2ff5fd9b08c064fff1a24
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\B6666573B462283A3403C0599718DD1394C86D7C
Filesize168KB
MD56fecac3f5b54067e68612234c426dabb
SHA12de424f4820bdfe0af7c5ea5d8b38cfd3df842de
SHA256ad71a12eaa163819aa9a752cac94cb82ce857d09a7c3bcdc590f327e1d6693c8
SHA512f6ba1be989c351121f05bd00c617efd802efa5f84fab9b37ee1bc46b07a583719e8c8146b55d48a047ee089983dc3a3abc6f9d97cd5efe834efcdef4fbd447d1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\BF0923D6C9AC3F4148AB74C98E937ACD57DCEAD3
Filesize97KB
MD5a3eebc4a3508a642de381246fb7a61db
SHA178fe51958e12d8aeb38182d0c0575eb7e08ec995
SHA2568502a2098c7699d35843866ec14477c81b4675a036c026d4884714000c32da7c
SHA512e49c0c160b664031dc6cc52353e2a3bc3de698e44acfef7d33270bc526690e5559c1ed02755410b2338ef573b7f76db59de2aa0f334559232da6d6db88508e0d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\E43DA6CCFCDC1C6C880E605F3394FD464C3D5999
Filesize146KB
MD5331dcf2869329c06302c640128441662
SHA120bc9771349ae0ee324bd67670a2a399b188e490
SHA25678621fcb2408ce22e577a038b66752af4b8219ce96bbeef27b989238eb9f3e88
SHA512b29c0c6295eb03a29dbf56d7c84583e0f7c1375434ec339f86594823baf62671b4004cacf14b7df299d7249b4c8821fc99d4b8c39d9e484e11e3c2c4a6b67398
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\E4E7B9945940B1FC6394842EA83EADBC597D4766
Filesize142KB
MD59604462609daaf76827119f55b042921
SHA199b61c4fb352b4333f9f767a22573f4dfc690d25
SHA2566e29ace0b9bc04beba29ecea4bc716bfc68ca223aee02348512d0a96a68e578b
SHA51293803db29c6931c1252520301580268fb793b8bc2719db4e66de70ffbc9b4a55081b637731ebcedb757233e1dae42ec24bd1bbfe415c88d7674c264e055951f9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\cache2\entries\E6C22A3DFCD18E3C6145370266896FF76AE3F7EC
Filesize92KB
MD5c40beb49865b90ea7d2900fde823f446
SHA1da256c77f1fd9c8876278059ab3a64fa358689ca
SHA2568c630f4a88c3b80ceb728880434fa2d76a82949ddafda7dd1334cbe47d0f2b13
SHA5128b247c0b0992864420521b243e659a141076db078a42b74ff4cc1fbdb8b10f66cab5c28f021fe49ab5ff5fc1669902ac9c32a31e40c14590442888ed836bf73c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\AlternateServices.bin
Filesize8KB
MD54a69d22d12b5e9d4094d9855687cf637
SHA1ad7d52246a0a537148acc2566e5b95dad318befd
SHA2561bc5ed78548b9ac6e5249dd5cdb1e28f5d2c0333794784b6c2a30d7ed4b7c2f0
SHA512e77852bee2df7df50ff8cac19967c3baf2a6ac7ed78962b239a5c4d80bcac864d0608ffda5655c8dc2d46be924d78ba14898268798eb4c6099a9410607eacc5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52be989d08009c5bf8e4ee808d03ef053
SHA1c6f8c3725393d1723eb083039de025e2cec4dd58
SHA256b8922838ef62fa83bfcecb628dda56c9c7646b0f4eb988231e6efbac30e6003f
SHA5128373b583bf695d3ee0be86a8b9e506450e52612df5a528a1bf42b078eec3d88f6719e92d4ac5f3969360d0da997afa0a894a1ff0837f600f8843ce385d9e19fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5340d78640e49518702045dcee569ca9e
SHA192e0a082878fd03c8b22118e4ea81c3e39339bc9
SHA2563197f80e6e0ca1fedd7729bb50f0e6565d3e1f323abbac0a6cdd83b0d8113bb6
SHA512409bac3706481df227c32bc643917e40d2abbc61e181f01192c12da412612f8cce38162f4f7705d21f3caa24bc59727dc88e4a6b247bbdfa617b87375b9fb9fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD58880d29ff125a8229f8e068b650081a9
SHA1a70dcb7fe9ebfe2d75242842cd98c6a64cd1f1cc
SHA256b5a50a7f664b4837aabeb6a82138f6cb97e4d07e225a97106a831c72d1dbe47f
SHA512ea0dbec1a2ffa41a325ae14066b2de03af2401db106f2b66d2d815871cdd2c07045412a86ccc93a3cc60e777f6de4cfc84eb292bf685c125d2c2fcded7aaaec1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\449ac60f-1e81-4be8-bebc-19b34e0f52ed
Filesize671B
MD5061361fe95e70f320b995197dfd30b29
SHA15877e7f54bceeef8e78ea09b28cce7a2a79aca50
SHA2560023e10c210ce6dec673d77e3836fd39d68c67ebdd7a78d5011c406bf2986b8d
SHA51226db2e1c212af67a8e3474b7a4f93a434fc47973a0308406b173ebeacae09c7e1f9bca6592b6143bb31db2006b6709f799c3c6e63cbbfe8ba8ef8f8031452fb8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\4ab602c3-95d4-421a-b362-321b4505ee9a
Filesize982B
MD5c0e5ce57a8ec13b72ff592038f3d9170
SHA1e02c3fd1301cf7d9f8dc56b56ad7bc1dafae0e12
SHA256122520efd5366cb5e9a6be0a3183f429a710cf3c3208bb38e8ba613c8885540b
SHA5120b3fd8bdce9bf058c41d81c6420359cd547482a45d8a7b09df491e2589e1bbd5029dccf9a68aa32af094557cf6337d474b9553b6291e021c32f52dfd1cfe4d47
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\770d2a58-9263-45b5-b502-a041caf2a2cb
Filesize26KB
MD571327fa1d64267783232b17216f160e0
SHA1290f2b17d1d7b9370ba2e02fc7055f5be109a9a0
SHA25601e7849968c7519eb75dabe1924e3da1feb2389430327461e57228efacbe9a53
SHA512306db33f9d27285238d4350ad714275dbe6ab9aedefa8db1656da93898fbe4c8cbbce978be2de97cccb87cdef3703dd3e214cd5283e252b332574ae4a8de567b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5a4a27883d2e25a0372a6bfcdf50d068f
SHA1bbe88ceb467f10ad165c92935ad932cbcf99927f
SHA2562c7ac57626e832aaf03569af524a59e7527c96f9014bef95e3c2287052b6394c
SHA512796d31e9371ff8b10e25bc8b5f967b59575d8e497786b6663bc0732b7b9e266c14411770c5aebaa794616a75dbf57d58d8bb5603fa2d9ee6f783d9ba10d66297
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5ce680560e09d2520d3d9333e2dc493dd
SHA14fa377754337fb4445cbf3a44ddab16823ca847f
SHA2563767e943c34944142da2f50a0e4f0f677fe0f0a8310866256979ee0733ac4349
SHA512f4102261ddf3b132b99bf8cab6608be7017da8c013d1abf1d57beb81ced59cdc2916637ee577c9d16506a0c68a6679ceefed6caf089cab54c2a2ee2bb37e9b4a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionstore-backups\recovery.baklz4
Filesize9KB
MD591e25febb75eb651d13c1741e3ed58a2
SHA1d791f50de98dfc598864ec91c0de577416a8e66c
SHA256b3d04964db107905fdc729db244f45c1d65c289283817fa3fedaa83cefc0b141
SHA5123f3f6ac1d91d7f618b9cf9d40a036d2931526ce023c3249ebf698a502dc81729b588986ac29f413dedab3828a18e3c892ba47e5dd0eb214f78ae1fed94d1d622
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionstore-backups\recovery.baklz4
Filesize9KB
MD5071a8f7d78f0394a5eb03c39113fb37c
SHA1cd466af79775e617b01f58fd92b1b84a84c0171c
SHA2566d6ead2a67eb3b9ad20f0d57f0a50d32285146bec6f897308409bf6225880b02
SHA512a7a2c70d321da9054f35333cdf3e4b59ee20efc9f5eef0a13a87d8f9460131e99b366bc831a34788a602b9e164318c1bd0f7f660c8676b50cee3c103115d714a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD538e74544e1572e57d32a318f8f27f951
SHA1267812f97b53761625e327ab45039b9e815e307c
SHA256c84a2be57a80668477e1a2a464cbd0b502403038dcc919422f71f167f77a9ec8
SHA512d9fd3563ba0065de611a43926ef2722aa09cca10eeca238d9934be8434681e6590192f27e39274511a9c98a2d24f2a44106cef77a4696e971b143437cf306f33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionstore-backups\recovery.baklz4
Filesize9KB
MD5ef44e46272ff4c67ed4b5f7ba874ace1
SHA1140218f4b2ff8cd85014d5af70400cdb2a77fa2d
SHA2560cf8d53ee11aa0d4465c38a7ee7fb3646077c85034f7be6e8ed7b118aa51a5cf
SHA51223cbbed0632d1840010053c42fc21758edd8e26adc12c170199b2bd2382ae82367a72624d3af4107cc6a33e85c8cd623aaae71e3caeed1d18df3aa1168cd9379
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444