Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
330s -
max time network
330s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
08/03/2025, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
BootstrapperNew.exe
Resource
win11-20250217-en
General
-
Target
BootstrapperNew.exe
-
Size
3.4MB
-
MD5
37d3fcd5058c45d2c2bba065a5c22296
-
SHA1
22debc7d8cdf3efd9b65ad099592c68ad7fa2713
-
SHA256
774cc2deb69d990bb908b5b4a77314e474b357268dad92d917dcd85176f43ffd
-
SHA512
fcad1f64c733180c7812a673379a35e488ed3306ca6146b187c7627a670012cec2a9166bf88815fbc1468cb70e7a1215a54e34aab37cba0f4ded8ce914323bdc
-
SSDEEP
98304:IZXfHaFoQyDIvqkqXf0FglY1XOe97vLn:SaBqkSIglY1XOCnn
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Solara.exe -
pid Process 4668 powershell.exe 2224 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Solara.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\International\Geo\Nation BootstrapperNew.exe -
Executes dropped EXE 1 IoCs
pid Process 4808 Solara.exe -
Loads dropped DLL 2 IoCs
pid Process 4808 Solara.exe 4808 Solara.exe -
resource yara_rule behavioral1/files/0x0007000000027f39-129.dat themida behavioral1/memory/4808-133-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-135-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-136-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-134-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-310-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-341-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-342-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-343-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-362-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-363-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-364-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-869-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-932-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-943-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-944-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-962-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-986-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-987-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1213-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1223-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1224-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1263-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1298-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1316-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1335-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1345-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1346-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1347-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1348-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1349-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1350-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1351-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1352-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4808-1353-0x0000000180000000-0x00000001810AA000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Solara.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 pastebin.com 28 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4808 Solara.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1186239869\Part-RU msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1186239869\adblock_snippet.js msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1186239869\Filtering Rules msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-en-gb.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-es.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-ka.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_214984341\kp_pinslist.pb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-gu.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-mn-cyrl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_43510570\LICENSE msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1482059904\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-bg.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-et.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-fr.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-hy.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-la.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-sv.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-uk.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1186239869\Filtering Rules-AA msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1186239869\Part-DE msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-da.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_214984341\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1186239869\LICENSE msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-cy.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-el.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-en-us.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-und-ethi.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-cs.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-de-ch-1901.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-nl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_204228084\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_43510570\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1090616791\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-de-1996.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-ga.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-hi.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-nn.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-sl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-bn.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-hr.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-it.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-ml.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-nb.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-ru.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-sk.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_43510570\_metadata\verified_contents.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1186239869\Filtering Rules-CA msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1186239869\Part-FR msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-pa.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\_metadata\verified_contents.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1721620297\Microsoft.CognitiveServices.Speech.core.dll msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1721620297\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1482059904\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-hu.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_214984341\crs.pb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1721620297\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1186239869\Part-IT msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1186239869\Part-ES msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-eu.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-mr.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1319352337\hyph-mul-ethi.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1482059904\protocols.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2536_1090616791\manifest.fingerprint msedgewebview2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133859375893483086" msedgewebview2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4668 powershell.exe 4668 powershell.exe 2224 powershell.exe 2224 powershell.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe 4808 Solara.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 2536 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 4668 powershell.exe Token: SeIncreaseQuotaPrivilege 4668 powershell.exe Token: SeSecurityPrivilege 4668 powershell.exe Token: SeTakeOwnershipPrivilege 4668 powershell.exe Token: SeLoadDriverPrivilege 4668 powershell.exe Token: SeSystemProfilePrivilege 4668 powershell.exe Token: SeSystemtimePrivilege 4668 powershell.exe Token: SeProfSingleProcessPrivilege 4668 powershell.exe Token: SeIncBasePriorityPrivilege 4668 powershell.exe Token: SeCreatePagefilePrivilege 4668 powershell.exe Token: SeBackupPrivilege 4668 powershell.exe Token: SeRestorePrivilege 4668 powershell.exe Token: SeShutdownPrivilege 4668 powershell.exe Token: SeDebugPrivilege 4668 powershell.exe Token: SeSystemEnvironmentPrivilege 4668 powershell.exe Token: SeRemoteShutdownPrivilege 4668 powershell.exe Token: SeUndockPrivilege 4668 powershell.exe Token: SeManageVolumePrivilege 4668 powershell.exe Token: 33 4668 powershell.exe Token: 34 4668 powershell.exe Token: 35 4668 powershell.exe Token: 36 4668 powershell.exe Token: SeDebugPrivilege 2224 powershell.exe Token: SeIncreaseQuotaPrivilege 2224 powershell.exe Token: SeSecurityPrivilege 2224 powershell.exe Token: SeTakeOwnershipPrivilege 2224 powershell.exe Token: SeLoadDriverPrivilege 2224 powershell.exe Token: SeSystemProfilePrivilege 2224 powershell.exe Token: SeSystemtimePrivilege 2224 powershell.exe Token: SeProfSingleProcessPrivilege 2224 powershell.exe Token: SeIncBasePriorityPrivilege 2224 powershell.exe Token: SeCreatePagefilePrivilege 2224 powershell.exe Token: SeBackupPrivilege 2224 powershell.exe Token: SeRestorePrivilege 2224 powershell.exe Token: SeShutdownPrivilege 2224 powershell.exe Token: SeDebugPrivilege 2224 powershell.exe Token: SeSystemEnvironmentPrivilege 2224 powershell.exe Token: SeRemoteShutdownPrivilege 2224 powershell.exe Token: SeUndockPrivilege 2224 powershell.exe Token: SeManageVolumePrivilege 2224 powershell.exe Token: 33 2224 powershell.exe Token: 34 2224 powershell.exe Token: 35 2224 powershell.exe Token: 36 2224 powershell.exe Token: SeDebugPrivilege 4816 BootstrapperNew.exe Token: SeDebugPrivilege 4808 Solara.exe Token: SeDebugPrivilege 5108 firefox.exe Token: SeDebugPrivilege 5108 firefox.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5108 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4668 4816 BootstrapperNew.exe 91 PID 4816 wrote to memory of 4668 4816 BootstrapperNew.exe 91 PID 4816 wrote to memory of 2224 4816 BootstrapperNew.exe 94 PID 4816 wrote to memory of 2224 4816 BootstrapperNew.exe 94 PID 4816 wrote to memory of 4808 4816 BootstrapperNew.exe 96 PID 4816 wrote to memory of 4808 4816 BootstrapperNew.exe 96 PID 4808 wrote to memory of 2536 4808 Solara.exe 98 PID 4808 wrote to memory of 2536 4808 Solara.exe 98 PID 2536 wrote to memory of 3524 2536 msedgewebview2.exe 99 PID 2536 wrote to memory of 3524 2536 msedgewebview2.exe 99 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 2832 2536 msedgewebview2.exe 100 PID 2536 wrote to memory of 3196 2536 msedgewebview2.exe 101 PID 2536 wrote to memory of 3196 2536 msedgewebview2.exe 101 PID 2536 wrote to memory of 1772 2536 msedgewebview2.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
cURL User-Agent 9 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 47 curl/8.9.1-DEV HTTP User-Agent header 38 curl/8.9.1-DEV HTTP User-Agent header 43 curl/8.9.1-DEV HTTP User-Agent header 45 curl/8.9.1-DEV HTTP User-Agent header 46 curl/8.9.1-DEV HTTP User-Agent header 59 curl/8.9.1-DEV HTTP User-Agent header 60 curl/8.9.1-DEV HTTP User-Agent header 186 curl/8.9.1-DEV HTTP User-Agent header 44 curl/8.9.1-DEV
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\ProgramData\Solara\Solara.exe"C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=4808.1728.66678729594784758833⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x184,0x188,0x18c,0x160,0x194,0x7ffde86cb078,0x7ffde86cb084,0x7ffde86cb0904⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1828,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=1824 /prefetch:24⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2084,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=2088 /prefetch:34⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2388,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=2384 /prefetch:84⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3584,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:14⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=1232,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=4836 /prefetch:84⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=784,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=4948 /prefetch:84⤵PID:5692
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4852,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=4920 /prefetch:84⤵PID:5964
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4532,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=1032 /prefetch:84⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4948,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=1036 /prefetch:84⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4860,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=4864 /prefetch:84⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4848,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=4340 /prefetch:84⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4432,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=3976 /prefetch:84⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4984,i,2547752587625413856,6888186240755367207,262144 --variations-seed-version --mojo-platform-channel-handle=4704 /prefetch:84⤵PID:5640
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:1860
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5108 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1956 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1884 -prefsLen 27357 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d51af0a5-1aea-4893-a0d2-7cd31afd66a4} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" gpu3⤵PID:4800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2364 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2352 -prefsLen 27235 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fba18f43-16cf-49c1-a29c-bab33c09738c} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" socket3⤵
- Checks processor information in registry
PID:1648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2952 -childID 1 -isForBrowser -prefsHandle 3128 -prefMapHandle 1384 -prefsLen 22636 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d768becb-3262-444c-9e51-6dc4bcbb9aeb} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" tab3⤵PID:2208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4004 -childID 2 -isForBrowser -prefsHandle 3996 -prefMapHandle 3988 -prefsLen 32609 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b43ebb2-c707-4226-b39e-1cb10ea2cf05} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" tab3⤵PID:1844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4200 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4776 -prefMapHandle 4792 -prefsLen 32609 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb1c264c-5c68-4721-b16a-c9544a5e89dd} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" utility3⤵
- Checks processor information in registry
PID:5608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5152 -childID 3 -isForBrowser -prefsHandle 5136 -prefMapHandle 5140 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9b289f1-6ade-4f2f-a74b-ce99ca316dea} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" tab3⤵PID:1140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5308 -childID 4 -isForBrowser -prefsHandle 5316 -prefMapHandle 5324 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3adb81a7-c30f-4acf-a486-d49f23747f08} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" tab3⤵PID:4988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5036 -childID 5 -isForBrowser -prefsHandle 5516 -prefMapHandle 5524 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {edb0eebc-e6a2-4506-a25d-05d876f0de2f} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" tab3⤵PID:456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5b037ca44fd19b8eedb6d5b9de3e48469
SHA11f328389c62cf673b3de97e1869c139d2543494e
SHA25611e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197
SHA512fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b
-
Filesize
50KB
MD5e107c88a6fc54cc3ceb4d85768374074
SHA1a8d89ae75880f4fca7d7167fae23ac0d95e3d5f6
SHA2568f821f0c818f8d817b82f76c25f90fde9fb73ff1ae99c3df3eaf2b955653c9c8
SHA512b39e07b0c614a0fa88afb1f3b0d9bb9ba9c932e2b30899002008220ccf1acb0f018d5414aee64d92222c2c39f3ffe2c0ad2d9962d23aaa4bf5750c12c7f3e6fe
-
Filesize
14KB
MD52a0506c7902018d7374b0ec4090c53c0
SHA126c6094af2043e1e8460023ac6b778ba84463f30
SHA256cad1e2eef6e20e88699fac5ef31d495890df118e58c86fc442ea6337aac7a75a
SHA5124a9856512e7866b8623565886e5f3aebf15c824cb127e24be9afa2a5501a83fa95d209875a8777566bcac9973b38881e18caf6ad160c8d01366a508cafc2164b
-
Filesize
14KB
MD5610eb8cecd447fcf97c242720d32b6bd
SHA14b094388e0e5135e29c49ce42ff2aa099b7f2d43
SHA256107d8d9d6c94d2a86ac5af4b4cec43d959c2e44d445017fea59e2e0a5efafdc7
SHA512cf15f49ef3ae578a5f725e24bdde86c33bbc4fd30a6eb885729fd3d9b151a4b13822fa8c35d3e0345ec43d567a246111764812596fd0ecc36582b8ee2a76c331
-
Filesize
5KB
MD58706d861294e09a1f2f7e63d19e5fcb7
SHA1fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23
SHA256fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42
SHA5121f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f
-
Filesize
171KB
MD56af9c0d237b31c1c91f7faa84b384bdf
SHA1c349b06cad41c2997f5018a9b88baedd0ba1ea11
SHA256fb2cbf2ee64286bc010a6c6fe6a81c6c292c145a2f584d0240c674f56e3015b0
SHA5123bda519fed1cfa5352f463d3f91194122cf6bf7c3c7ab6927c8ca3eea159d35deb39328576e7cbd982cfdf1f101b2a46c3165221501b36919dbde6f1e94bf5ff
-
Filesize
2.0MB
MD59399a8eaa741d04b0ae6566a5ebb8106
SHA15646a9d35b773d784ad914417ed861c5cba45e31
SHA25693d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18
SHA512d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8
-
Filesize
31KB
MD574dd2381ddbb5af80ce28aefed3068fc
SHA10996dc91842ab20387e08a46f3807a3f77958902
SHA256fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48
SHA5128841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e
-
Filesize
27KB
MD58a3086f6c6298f986bda09080dd003b1
SHA18c7d41c586bfa015fb5cc50a2fdc547711b57c3c
SHA2560512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9
SHA5129e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
619KB
MD591f5d6abf1fc57cb3e6222f10c51bff1
SHA1fd1183ba06cf793f12de674d8aa31bd8bfbe1172
SHA256c48c486f8655d33b4b0d7fc169adf5cbc964c723161953ef5877e99e45833840
SHA5124538dc6b1c0c21f09fcce5a496538c25cbbc88bd5bb484806fa9426753691df7d798882085be0bdf4ee542da793c04a0d45675265a6ced2f4ea61b691909597a
-
Filesize
280B
MD5c551d5ec7ce32d3d8673a64a72d0c4e1
SHA1ac69198eeb0eddd9cf9c6e51fe065b6ad2b7fac0
SHA256a2d2c9f27d869a87e05435ee8e114aac0d9705f51b473bdd2be09b09eabb8424
SHA5129815072d1c4d56c378e34996f25bb1c6dd59460da52a2f15cf5fe11cc68cfa1a7b0d33c1ffe81bb3303a5aa385d7e7c7d1b4aaf3c4e8cff4675fd8047c9c77fe
-
Filesize
280B
MD51a82f39d58e09dab8047a0ce2902701d
SHA1833b4e8fbf2f3142f0f769aeef7887fcdca8cdf5
SHA2561673d20bc8056e28bbc61e52a0c217380a55d21853dddc23d174e2d60f8a1263
SHA512bdf328845ea4d9293d8c6d5d16260ff571d1bd5a93eb9141769b70f914d6edf7adae2632539a8aacdee40896a9850cc65f5edae6879a2f3c34beadc8b9e4b527
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5d4c7aecd99486dee27103e289b36b454
SHA109674dce3af57e35f70e14ba224e2e31475ab2ff
SHA256ee8ed09e3db1e6ae86fedbe177bbc948852469be7d1d5c18d1506c188580cd4b
SHA512fc7f7fcf875e44c73fddc0f323dced02c3ece00748a3685d4bd78dda8022bb25f6b37a6ee3937ab4c7e21edb69909e28db66cc1a32f4b63b41873ada60cfd077
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\Network Persistent State~RFe5fd904.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD562b821e517d419c7e4a7d64804d8495d
SHA1bf15258072ddb41a529b35577d5ed9dc50a31bab
SHA256ac4612eb99660f91bc000f71d0f56b6fb7e84e12d29bb392574a30079802f1fe
SHA5126219c8fcc7ed2aacd2db135355e4e5960ac4fe5e8ef1ae9aa25146dd179156cf937f7848e3aadaacf4f8e63bd958bbe0daa291926d48f31d3cc5dd52dae95d50
-
Filesize
6KB
MD59feb3886b16e281d926d0bd5befc8237
SHA1afb8877f7800209f18759bcadcf3910c756c5e9a
SHA25643debfa4d8bb6a3e478393baf5c38bc469d20201ff6d24dd870ad71b43564404
SHA51229b033119efb19d5e7d5968f69c7c96877b25dff92516f6fd84f8e0d25a666599f1b4321d928adde62c5415f824374df4f048b31827caa790c3bbfaf8866fb4b
-
Filesize
6KB
MD57b04a89791b46aa45cd1e0a5dec51c8d
SHA144316eef7dd030a89be459456158c693c984f004
SHA25622d15386f07c350dfe8deee279c83838f776bb681ae8dff3e565d1ebdcaecdbd
SHA512547c3a9e08447f04625ec4f36df69d497c36952286c18dd55b64e66cadec247a8c4740fa4bfa67b13d05915d58a62defebbc4abe270f96c4d593e43805d5dfca
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
1KB
MD528421b3d17a3609ebc12cf69494eabcc
SHA1a551953042935bb9388046ea0e020f909792a2d5
SHA2565273843dd6dcb825ced26d9868706f4f6e190474fdffbd4184e9beca1381da5e
SHA51266b404a2c30da60860b5224982bac93d2b43a9a495407e04ab2050549c8d40998dc6112113d18154e73c8ca8efb892e8532881e35655daf25257e05410f172a3
-
Filesize
2KB
MD57fa00f26a9e0e42bb11f715b16b0e025
SHA13fee2987d0847a334f2bb896c7c9501118bf4eeb
SHA2569e2b48c67c8674e1a815e4636373f811d7e2b77cc0296384de15605654b708e3
SHA512562939d9ddf076ad56589e51c5ae5c946a6fbefdcba5a2f04f8084574de7bed9851b724d47371422f0942ec11c522b1b515fbe9f327a5c43fcaf4fc91167a6c0
-
Filesize
3KB
MD584f2bab3f082078d02504c72bab049cb
SHA1be111f6a46b03bde5e1f3b4c913541f8e8521f30
SHA256543a597a1f00679028ede0a767ff9741540660b0df0270fe5991be07418bc56f
SHA512a1b209dfb86ccff9e0bb1fb47faef6aa8390cfa5d3977766a3e64e859ce158320b42d67995fad52939d7fa3305a14a562b09276545d83ce070f270a7495948a1
-
Filesize
16KB
MD5e70397156a7966a0dc6f33270f5977f4
SHA10681d6c3c65fd6ca993c1ccd42e0a5eb6daafbe8
SHA25654d7d93d4e79b8227fc638b9f3219873b344eaa015a8f266f9081e9fd6defdc3
SHA51291d951bcc6d1a844ec9228fb2dcb92277cbd3c87e6d319cfe61dd8b0440ece83659128ce38a69dc389cad67ab4608f910810c985ffe341191fd1fbf069c2f9f6
-
Filesize
19KB
MD5880b374d54c9879bd79c5bc2ed8ebcf7
SHA1d61f42ec64d4e7bb5494a2404477733bb612465c
SHA2566419c74b0ddfb24ae0dd3161315ae4416bddb8f10721ae79c7cee5f28435c064
SHA512754e9ce3b0c01709c60297ddfc75f4934b38a4568657f1a5ebb74768377d81ffef635ead09061371fea80f00b82c41e991bbcb3701a2e602668bd8e7320d63b3
-
Filesize
1KB
MD5ceca746b1510cd0428a335494b7bbbf8
SHA177c38545cb25b38dcac861b3c23843dc69efbf4a
SHA256bd8baf7c6bd4e24ad26364dcf6bc4c050464307eaa73329efe5eb4cde1a179d9
SHA512abe07398a08f8de8f2d4b16039de1c85a5a6ce3b03eb8028a0fc25880cfbc9b6c0fb96be8b658f685195c52458085c774ef0cf13959f80cada5dd5953d3d03d2
-
Filesize
6.4MB
MD522a100971f552b0aaca41291d65fa169
SHA16bdf503d13a53931417af4600225875361feba78
SHA25666dde01c27784da1882a6444df7dbb69bf671cf3ef0cfa2e3373ece1930928a3
SHA5129b58e305a3819e75f585a1ea74cf8edac817045d839b27b90794c8eb6e0fe350cfb28f44f9a4bc0005c62259aaa9d66a5f2f99623acdf69c1d3d7d6efb482bdc
-
Filesize
133KB
MD5a0bd0d1a66e7c7f1d97aedecdafb933f
SHA1dd109ac34beb8289030e4ec0a026297b793f64a3
SHA25679d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36
SHA5122a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50
-
Filesize
5.2MB
MD5aead90ab96e2853f59be27c4ec1e4853
SHA143cdedde26488d3209e17efff9a51e1f944eb35f
SHA25646cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed
SHA512f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d
-
Filesize
3KB
MD535f6f7dce4b40edb4d8fde2efb97f2d2
SHA18521f4604bce0443a7565a16231e0549eb6712e9
SHA2568d4d0d42997af6194af00873aeef846818f8900c09650a77ff8436c3df454780
SHA512bdd5bfdb51afd116eb397e3b1b963f9bbc393b2a27a0c1d421b4b9ad1f7fd95bfcff45f6965a698d6cc7cc236be63b8e4573c47810c80d92131adea94cf3c55a
-
Filesize
1KB
MD510a74411602d2a66afc827c4da353658
SHA19a874194fbe6bc480ef4d776148fcfff4e05a700
SHA2561ad69e77d61efc0b5df3f116d02c75b78d5961933984ab885951fdc2ec6ac6ec
SHA51256b1f1bf0b3fb659b6d18e8fc4a01f49133b9c16cdd5c05ab3d92046a75daf4713e95fb905f1f4ad06d1c3120198de67b454022a6440ddbc692baab3b45d5b31
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\wh2v4aco.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5c9d761bbcbf8145c6a83b2c68a2d4784
SHA1622878e48dba72215291116cc9e4a0a4b946005e
SHA256699142522382a18b3531a0de508599584e180abad5105b8d995772b54d45111f
SHA5121acca4220a5dfdb4d73f4e37e7812c7ce827fee13aa5581ac9377518dfec90009f0808f3b72d1e51ab09dda75a1060effdcf0ad0efc0b9f5d713c6dc1bd5fdea
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wh2v4aco.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ac30583870b27da8acb8e02292e86acc
SHA12c041a2733ec256360be9bc46ce785b3af9d5248
SHA25672431f74788eb80fcf14e710ea3d72102c7804bd74be05153109e94605286f48
SHA512148e76214f5bc2b910878b835f864597b37be7b81b3efa93efe624ae7162beb0db8bf95d9c1b8ec180384f23bda4abab6f46db033a93eedfec98b9fea9c708c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wh2v4aco.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD512cf4176084b4094f88edfa2bb0cc7ea
SHA1e554d834366f81d92e9889729c90316985573294
SHA2567a845d1e555d07680cd350a3e3904adc4fa97745cc51de96c7cb4abdcd3a0831
SHA5129f8d6601d431c3899374782ae0c672c86c6411ba1773c9c647248b440f3825bb207731cee7b6f91b999e031b4b47b67afdea3bc8c1d1e8d699e87b87afec51c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wh2v4aco.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b2f09c5b9fa59fda97ba43ce8c8d2bb1
SHA10b7eb53223b386283128ca3547e1b67e644d61d0
SHA256b61d087897f440e10fcc5f01ea3c8ae7ed650e5033b9a60106ab1822a33c09ad
SHA5120ecf17a0b1320fcd13effaa0fc359e4746dcb0587d2568ed62473cb5925b05db3b619d60530ad69ddbf1ee6e022018eb49817cd352a376c5ec097a3c5782846e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wh2v4aco.default-release\datareporting\glean\pending_pings\626118db-e5e0-4466-8b90-1f0ac2cbde12
Filesize982B
MD5f0779c85c4383ee8d9e2f2050bc73dff
SHA1100a4f004abb14df8e6e0a7776c79f1ccfeadfd9
SHA2567cf9f53363877f851ac028a84b862dc11c4890898a9a127238dcde4f971b8968
SHA5128de5d1bdb2315a19c81a88c300f8320be3f4c5dfc024c87fce6469ec28339db1faaeb083bb8bb1af3db8b065528dcd4c44a23bbfa691397effc8d7ec3c4ed88e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wh2v4aco.default-release\datareporting\glean\pending_pings\79d13309-6782-472f-870b-1e6564cdf32b
Filesize671B
MD5dc71f9ec44cb25a8627b9bfbc9187317
SHA10d60da41197cdeaa9a7b75162756143f4fce75c1
SHA256c335ddcf9f261970455b488b1e48a99880f25d9999db48112b50970e093bedba
SHA512084a3e8596349ac9b96ed9db52eec5a0eea3e73bfd6c9c7de13af2b0137f0e16e03b6f38d5a42af79e1a335be1572aa5d0f9a26b1beef07882e8176d5eaa7bda
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wh2v4aco.default-release\datareporting\glean\pending_pings\c847df8d-4228-4b8d-9b3e-2142468eaf7f
Filesize26KB
MD53053597b37cf2acbd1b4300484e61fa9
SHA15ed7ff186c2bb35b80f338bbb61e4a830ca8b1e3
SHA256ce38aa420479b8854f4cb976cb72f3f5352e1c9469ec53aaa698d519ca83154b
SHA512e134a0a2a1e13f75051354cac56491658145dce556bfbd7659a579d9ddef6fee04ff56317185a20706f2157f68a601e4ac43e697c353d2b7fa3af5ed30d54bef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wh2v4aco.default-release\datareporting\glean\pending_pings\e91be038-60b4-4b73-ab5c-e93142f7ea87
Filesize5KB
MD5db85b656eca8a2b9f87a839e0efe0c4d
SHA1c217ae4ce75fe77c59df0924457a386405550ccf
SHA2563c3b4846cd1329f1ac85141abec0d020c0f3be4f9f03491ca4a133cce28ff13b
SHA5128f37f1b0f435afccd4c5ce7f1c2edb42cc33435172c23f319e3fd57cf5eed358bd040bad6e21ff80bf57fb072106b419898dcc567b569037557c0eaa4f47db16
-
Filesize
9KB
MD561d2a21d6bd47c3561f11808679fd675
SHA18ff648f2bd69716b78233305a068c3d78771d504
SHA256e96fade695574222500fa57a7dd9e0088251caba9f0636486578c2e855a4fd2b
SHA5127796d9c42dd331841e939e82b5d78f0895892ca143de01ad2663e56149bee87f1c726c791be1000a667defd411e856343c621eaabb3367af27a6bf29e43981cc
-
Filesize
9KB
MD5c6f85af24f17bad228b57108f65bc4ef
SHA1e11eead886010282a4ee29b2f677bc49a58bc458
SHA256fb29b767b352b1a1878fc456e272ed38b9929111f82d6e0dc9661856e0c03305
SHA512190e7456bba78c8edcf945c9328bce488b430c01f682367e97b154188688fc44a3b4fdebf8b537eae4a572f5510317b9493df726345bae7431d6c208353b3456
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5f2d8fe158d5361fc1d4b794a7255835a
SHA16c8744fa70651f629ed887cb76b6bc1bed304af9
SHA2565bcbb58eaf65f13f6d039244d942f37c127344e3a0a2e6c32d08236945132809
SHA512946f4e41be624458b5e842a6241d43cd40369b2e0abc2cacf67d892b5f3d8a863a0e37e8120e11375b0bacb4651eedb8d324271d9a0c37527d4d54dd4905afab