Analysis
-
max time kernel
1799s -
max time network
1644s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-07-2024 22:28
Static task
static1
Behavioral task
behavioral1
Sample
x64/ProcessHacker.exe
Resource
win11-20240508-en
General
-
Target
x64/ProcessHacker.exe
-
Size
1.6MB
-
MD5
b365af317ae730a67c936f21432b9c71
-
SHA1
a0bdfac3ce1880b32ff9b696458327ce352e3b1d
-
SHA256
bd2c2cf0631d881ed382817afcce2b093f4e412ffb170a719e2762f250abfea4
-
SHA512
cc3359e16c6fe905a9e176a87acf4c4ed5e22c29bfca11949799caf8442e00ec0d1679b3d8754dbc3e313528d3e8e82c0ec1941e2c3530b48229c1cb337f6b8b
-
SSDEEP
24576:V7eokafnkAwgcU+29fR4PQviXq1pj3EDT5m+m8I:V6efnkdlUF92PGBOT3m8
Malware Config
Signatures
-
Drops file in Drivers directory 18 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\acpi.pdb ProcessHacker.exe File opened for modification C:\Windows\System32\drivers\msrpc.pdb ProcessHacker.exe File opened for modification C:\Windows\system32\drivers\http.pdb ProcessHacker.exe File opened for modification C:\Windows\System32\drivers\pci.pdb ProcessHacker.exe File opened for modification C:\Windows\system32\drivers\ndis.pdb ProcessHacker.exe File opened for modification C:\Windows\System32\drivers\spaceport.pdb ProcessHacker.exe File opened for modification C:\Windows\System32\drivers\dxgkrnl.pdb ProcessHacker.exe File opened for modification C:\Windows\System32\drivers\dxgmms2.pdb ProcessHacker.exe File opened for modification C:\Windows\system32\drivers\storqosflt.pdb ProcessHacker.exe File opened for modification C:\Windows\System32\drivers\mpsdrv.pdb ProcessHacker.exe File opened for modification C:\Windows\system32\drivers\mmcss.pdb ProcessHacker.exe File opened for modification C:\Windows\system32\drivers\ndu.pdb ProcessHacker.exe File opened for modification C:\Windows\system32\drivers\Wdf01000.pdb ProcessHacker.exe File opened for modification C:\Windows\System32\drivers\volsnap.pdb ProcessHacker.exe File opened for modification C:\Windows\System32\drivers\watchdog.pdb ProcessHacker.exe File opened for modification C:\Windows\system32\DRIVERS\rdbss.pdb ProcessHacker.exe File opened for modification C:\Windows\system32\drivers\bam.pdb ProcessHacker.exe File opened for modification C:\Windows\System32\drivers\vhdmp.pdb ProcessHacker.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\ntkrnlmp.pdb ProcessHacker.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\basicrender.inf_amd64_e1a5502a3a50be4e\BasicRender.pdb ProcessHacker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ProcessHacker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessHacker.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 ProcessHacker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 ProcessHacker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 5c000000010000000400000000080000190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc36200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8040000000100000010000000d474de575c39b2d39c8583c5c065498a2000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a ProcessHacker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1104 ProcessHacker.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 1104 ProcessHacker.exe Token: SeIncBasePriorityPrivilege 1104 ProcessHacker.exe Token: 33 1104 ProcessHacker.exe Token: SeLoadDriverPrivilege 1104 ProcessHacker.exe Token: SeProfSingleProcessPrivilege 1104 ProcessHacker.exe Token: SeRestorePrivilege 1104 ProcessHacker.exe Token: SeShutdownPrivilege 1104 ProcessHacker.exe Token: SeTakeOwnershipPrivilege 1104 ProcessHacker.exe Token: SeDebugPrivilege 2488 firefox.exe Token: SeDebugPrivilege 2488 firefox.exe Token: SeDebugPrivilege 2488 firefox.exe Token: SeDebugPrivilege 2488 firefox.exe Token: SeDebugPrivilege 2488 firefox.exe Token: SeDebugPrivilege 2488 firefox.exe Token: SeDebugPrivilege 2488 firefox.exe Token: SeDebugPrivilege 2488 firefox.exe Token: SeDebugPrivilege 2488 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe 1104 ProcessHacker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2488 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 1028 wrote to memory of 2488 1028 firefox.exe 83 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2708 2488 firefox.exe 84 PID 2488 wrote to memory of 2192 2488 firefox.exe 85 PID 2488 wrote to memory of 2192 2488 firefox.exe 85 PID 2488 wrote to memory of 2192 2488 firefox.exe 85 PID 2488 wrote to memory of 2192 2488 firefox.exe 85 PID 2488 wrote to memory of 2192 2488 firefox.exe 85 PID 2488 wrote to memory of 2192 2488 firefox.exe 85 PID 2488 wrote to memory of 2192 2488 firefox.exe 85 PID 2488 wrote to memory of 2192 2488 firefox.exe 85 PID 2488 wrote to memory of 2192 2488 firefox.exe 85 PID 2488 wrote to memory of 2192 2488 firefox.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\x64\ProcessHacker.exe"C:\Users\Admin\AppData\Local\Temp\x64\ProcessHacker.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Checks processor information in registry
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1104
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4036
-
C:\Windows\System32\trotz3rf3rr7q.exe"C:\Windows\System32\trotz3rf3rr7q.exe"1⤵PID:632
-
C:\Windows\System32\lro3o3.exe"C:\Windows\System32\lro3o3.exe"1⤵PID:4152
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.0.517649432\985156125" -parentBuildID 20230214051806 -prefsHandle 1772 -prefMapHandle 1764 -prefsLen 22074 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9bc695a5-3dc7-4393-8426-9545faa4a484} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 1848 25142423a58 gpu3⤵PID:2708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.1.101012964\555429278" -parentBuildID 20230214051806 -prefsHandle 2344 -prefMapHandle 2332 -prefsLen 22110 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa04a7ce-47a2-4767-b0ae-7a6e999ae173} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 2372 2513578a258 socket3⤵PID:2192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.2.1460730422\808029505" -childID 1 -isForBrowser -prefsHandle 2868 -prefMapHandle 2864 -prefsLen 22148 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3dc4b6f7-3ecf-4998-b710-3bc02e1a74e0} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 2916 251451ec858 tab3⤵PID:3760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.3.1121742009\1893741968" -childID 2 -isForBrowser -prefsHandle 3772 -prefMapHandle 3768 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bb9cb0d-d903-4659-add6-be49abeb5a37} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 3784 25147e33858 tab3⤵PID:5104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.4.1062140737\1008577095" -childID 3 -isForBrowser -prefsHandle 5152 -prefMapHandle 5132 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3c59eabf-3547-4223-a20a-b897fbbc8aff} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 5164 2514ac38d58 tab3⤵PID:2492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.5.1878288842\715545762" -childID 4 -isForBrowser -prefsHandle 5384 -prefMapHandle 5380 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29ec7b06-e2c2-43f8-9b1c-e25276eb9082} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 5392 2514ac38158 tab3⤵PID:132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.6.72378659\1478530498" -childID 5 -isForBrowser -prefsHandle 5344 -prefMapHandle 5348 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1404ef46-ef55-4eda-a233-a3026b170e88} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 5336 2514ac38758 tab3⤵PID:3664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.7.581890709\2010152494" -childID 6 -isForBrowser -prefsHandle 3508 -prefMapHandle 3520 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {824f75bf-f1af-461a-96ab-8a0beb61a40a} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 3000 25135782858 tab3⤵PID:2212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.8.1797412233\949130501" -childID 7 -isForBrowser -prefsHandle 5416 -prefMapHandle 5404 -prefsLen 31160 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f9f0cbe7-0b77-4725-8335-611b155739e3} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 5500 2513577d058 tab3⤵PID:4632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.9.847270223\2101031342" -childID 8 -isForBrowser -prefsHandle 4816 -prefMapHandle 5932 -prefsLen 31160 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a113754-a9dd-4e1c-9f8b-8ebe24960143} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 4808 2513577c458 tab3⤵PID:2956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2488.10.1347180822\1598115199" -childID 9 -isForBrowser -prefsHandle 4040 -prefMapHandle 4036 -prefsLen 31160 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab99c9e3-eebe-483d-a98a-4597885b499d} 2488 "\\.\pipe\gecko-crash-server-pipe.2488" 3432 25135789958 tab3⤵PID:4856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD598ffe6b91bfcefa3e9cb3ff2da517b02
SHA1893965d66436e0913cd33b684adea3b0bafdaa75
SHA256e3553e48416675b9c7cb63870438b0daeaf06587a523d2383e69db80430a3db4
SHA512c508b9af4191b0b2b0661f395a5075640efa92483b16175da2c2bf86188ca794981cf56a3bc7332aacc4bef85eceec002ffb626249b67829c2832b50fcff3b4b
-
Filesize
11KB
MD5889ae82ccbced7aeb0dfee1bd1b63131
SHA17cac5c147b9b655b215963352c327602750c24c3
SHA25662c9b08b7ad802eb2ffba4d13e62a0331f24f4a92477fcc589e0c97a62ad724a
SHA512e600d0bcbbbf2965090a03238490d5fe2a78c7552277e6d501b5fb0fc68305c7157c16ebc4f181c84e57befe883ac8fbc9c7773c067902ebf2da6bf3d9a23b08
-
Filesize
11KB
MD5207178cc09318062829f2dcc410e9c47
SHA11141959fa1300ce02f8e3bd41d0150be7c8c0eb9
SHA256ff1d4add4f6d260bdc4afa56d0c44cd66925688c31e81f9690d8466a626e7c5f
SHA512b009a019432a3a64a0b4df26ffdd20cb9a3fb503c7bfdab58aabaa15f8e49dcb2b40db05ad28ef0e25e34a0435331a390de03d9804200357fbbe2b8a07870632
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\cache2\entries\5CD1EBDF6B57F13C7E783CE5E6D8E9C44014FE1A
Filesize13KB
MD5e01a8efadfcec95491ae2d58252c1550
SHA158f4c2943867c018c3e3cbc1e34645d12b4f3d63
SHA2564624eaf89c0fe3459bb03c6724956e6c0c1ed8324495eb04f888f879f753d472
SHA512c820ac1804bb2244da4927adb08175fc60a7fe3b88a9905fd768a15793760a9dc30145979cddbc8c9dab10348adbf72f35e1386c9571b97549bbd8473f7fed2e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_arts_and_entertainment.json
Filesize67KB
MD56c651609d367b10d1b25ef4c5f2b3318
SHA10abcc756ea415abda969cd1e854e7e8ebeb6f2d4
SHA256960065cc44a09bef89206d28048d3c23719d2f5e9b38cfc718ca864c9e0e91e9
SHA5123e084452eefe14e58faa9ef0d9fda2d21af2c2ab1071ae23cde60527df8df43f701668ca0aa9d86f56630b0ab0ca8367803c968347880d674ad8217fba5d8915
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_autos_and_vehicles.json
Filesize44KB
MD539b73a66581c5a481a64f4dedf5b4f5c
SHA190e4a0883bb3f050dba2fee218450390d46f35e2
SHA256022f9495f8867fea275ece900cfa7664c68c25073db4748343452dbc0b9eda17
SHA512cfb697958e020282455ab7fabc6c325447db84ead0100d28b417b6a0e2455c9793fa624c23cb9b92dfea25124f59dcd1d5c1f43bf1703a0ad469106b755a7cdd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_beauty_and_fitness.json
Filesize33KB
MD50ed0473b23b5a9e7d1116e8d4d5ca567
SHA14eb5e948ac28453c4b90607e223f9e7d901301c4
SHA256eed46e8fe6ff20f89884b4fc68a81e8d521231440301a01bb89beec8ebad296b
SHA512464508d7992edfa0dfb61b04cfc5909b7daacf094fc81745de4d03214b207224133e48750a710979445ee1a65bb791bf240a2b935aacaf3987e5c67ff2d8ba9c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_blogging_resources_and_services.json
Filesize33KB
MD5c82700fcfcd9b5117176362d25f3e6f6
SHA1a7ad40b40c7e8e5e11878f4702952a4014c5d22a
SHA256c9f2a779dba0bc886cc1255816bd776bdc2e8a6a8e0f9380495a92bb66862780
SHA512d38e65ab55cee8fef538ad96448cd0c6b001563714fc7b37c69a424d0661ec6b7d04892cf4b76b13ddbc7d300c115e87e0134d47c3f38ef51617e5367647b217
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_books_and_literature.json
Filesize67KB
MD5df96946198f092c029fd6880e5e6c6ec
SHA19aee90b66b8f9656063f9476ff7b87d2d267dcda
SHA256df23a5b6f583ec3b4dce2aca8ff53cbdfadfd58c4b7aeb2e397eade5ff75c996
SHA51243a9fc190f4faadef37e01fa8ad320940553b287ed44a95321997a48312142f110b29c79eed7930477bfb29777a5a9913b42bf22ce6bb3e679dda5af54a125ea
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_business_and_industrial.json
Filesize45KB
MD5a92a0fffc831e6c20431b070a7d16d5a
SHA1da5bbe65f10e5385cbe09db3630ae636413b4e39
SHA2568410809ebac544389cf27a10e2cbd687b7a68753aa50a42f235ac3fc7b60ce2c
SHA51231a8602e1972900268651cd074950d16ad989b1f15ff3ebbd8e21e0311a619eef4d7d15cdb029ea8b22cf3b8759fa95b3067b4faaadcb90456944dbc3c9806a9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_computers_and_electronics.json
Filesize45KB
MD56ccd943214682ac8c4ec08b7ec6dbcbd
SHA118417647f7c76581d79b537a70bf64f614f60fa2
SHA256ab20b97406b0d9bf4f695e5ec7db4ebad5efb682311e74ca757d45b87ffc106b
SHA512e57573d6f494df8aa7e8e6a20427a18f6868e19dc853b441b8506998158b23c7a4393b682c83b3513aae5075a21148dd8ca854a11dabcea6a0a0db8f2e6828b8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_finance.json
Filesize33KB
MD5e95c2d2fc654b87e77b0a8a37aaa7fcf
SHA1b4b00c9554839cab6a50a7ed8cd43d21fdaf35dc
SHA256384bf5fcc6928200c7ebb1f03f99bf74f6063e78d3cd044374448f879799318e
SHA5129696998a8d0e3a85982016ff0a22bb8ae1790410f1f6198bb379c0a192579f24c75c25c7648b76b00d25a32ac204178acaccd744ee78846dfc62ebf70bf7b93a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_food_and_drink.json
Filesize67KB
MD570ba02dedd216430894d29940fc627c2
SHA1f0c9aa816c6b0e171525a984fd844d3a8cabd505
SHA256905357002f2eced8bba1be2285a9b83198f60d2f9bb1144b5c119994f2ec6e34
SHA5123ae60d0bf3c45d28e340d97106790787be2cc80ba579d313b5414084664b86e89879391c99e94b6e33bdc5508ea42a9fd34f48ca9b1e7adfa7b6dd22c783c263
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_games.json
Filesize44KB
MD54182a69a05463f9c388527a7db4201de
SHA15a0044aed787086c0b79ff0f51368d78c36f76bc
SHA25635e67835a5cf82144765dfb1095ebc84ac27d08812507ad0a2d562bf68e13e85
SHA51240023c9f89e0357fae26c33a023609de96b2a0b439318ef944d3d5b335b0877509f90505d119154eaa81e1097ecfb5aa44dd8bb595497cdecfc3ee711a1fe1d5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_health.json
Filesize33KB
MD511711337d2acc6c6a10e2fb79ac90187
SHA15583047c473c8045324519a4a432d06643de055d
SHA256150f21c4f60856ab5e22891939d68d062542537b42a7ce1f8a8cec9300e7c565
SHA512c2301ed72f623b22f05333c5ecc5ebf55d8a2d9593167cc453a66d8f42c05ff7c11e2709b6298912038a8ea6175f050bbc6d1fc4381f385f7ad7a952ad1e856b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_hobbies_and_leisure.json
Filesize67KB
MD5bb45971231bd3501aba1cd07715e4c95
SHA1ea5bfd43d60a3d30cda1a31a3a5eb8ea0afa142a
SHA25647db7797297a2a81d28c551117e27144b58627dbac1b1d52672b630d220f025d
SHA51274767b1badbd32cacd3f996b8172df9c43656b11fea99f5a51fff38c6c6e2120fae8bdd0dd885234a3f173334054f580164fdf8860c27cbcf5fb29c5bcdc060d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_home_and_garden.json
Filesize33KB
MD5250acc54f92176775d6bdd8412432d9f
SHA1a6ad9ad7519e5c299d4b4ba458742b1b4d64cb65
SHA25619edd15ebce419b83469d2ab783c0c1377d72a186d1ff08857a82bca842eea54
SHA512a52c81062f02c15701f13595f4476f0a07735034fcf177b1a65b001394a816020ee791fed5afae81d51de27630b34a85efa717fe80da733556fdda8739030f49
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_internet_and_telecom.json
Filesize67KB
MD536689de6804ca5af92224681ee9ea137
SHA1729d590068e9c891939fc17921930630cd4938dd
SHA256e646d43505c9c4e53dbaa474ef85d650a3f309ccf153d106f328d9b6aeb66d52
SHA5121c4f4aa02a65a9bbdf83dc5321c24cbe49f57108881616b993e274f5705f0466be2dd3389055a725b79f3317c98bdf9f8d47f86d62ebd151e4c57cc4dca2487c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_jobs_and_education.json
Filesize33KB
MD52d69892acde24ad6383082243efa3d37
SHA1d8edc1c15739e34232012bb255872991edb72bc7
SHA25629080288b2130a67414ecb296a53ddd9f0a4771035e3c1b2112e0ce656a7481a
SHA512da391152e1fbce1f03607b486c5dea9a298a438e58e440ebb7b871bd5c62d7339b540eed115b4001b9840de1ba3898c6504872ff9094ba4d6a47455051c3f1c5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_law_and_government.json
Filesize68KB
MD580c49b0f2d195f702e5707ba632ae188
SHA1e65161da245318d1f6fdc001e8b97b4fd0bc50e7
SHA256257ee9a218a1b7f9c1a6c890f38920eb7e731808e3d9b9fc956f8346c29a3e63
SHA512972e95de7fe330c61cd22111bd3785999d60e7c02140809122d696a1f1f76f2cd0d63d6d92f657cdec24366d66b681e24f2735a8aabb8bcecec43c74e23fb4f5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_online_communities.json
Filesize67KB
MD537a74ab20e8447abd6ca918b6b39bb04
SHA1b50986e6bb542f5eca8b805328be51eaa77e6c39
SHA25611b6084552e2979b5bc0fd6ffdc61e445d49692c0ae8dffedc07792f8062d13f
SHA51249c6b96655ba0b5d08425af6815f06237089ec06926f49de1f03bc11db9e579bd125f2b6f3eaf434a2ccf10b262c42af9c35ab27683e8e9f984d5b36ec8f59fd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_people_and_society.json
Filesize45KB
MD5b1bd26cf5575ebb7ca511a05ea13fbd2
SHA1e83d7f64b2884ea73357b4a15d25902517e51da8
SHA2564990a5d17bea15617624c48a0c7c23d16e95f15e2ec9dd1d82ee949567bbaec0
SHA512edcede39c17b494474859bc1a9bbf18c9f6abd3f46f832086db3bb1337b01d862452d639f89f9470ca302a6fcb84a1686853ebb4b08003cb248615f0834a1e02
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_pets_and_animals.json
Filesize44KB
MD55b26aca80818dd92509f6a9013c4c662
SHA131e322209ba7cc1abd55bbb72a3c15bc2e4a895f
SHA256dd537bfb1497eb9457c0c8ecbd2846f325e13ddef3988fd293a29e68ab0b2671
SHA51229038f9f3b9b12259fb42daa93cdefabb9fb32a10f0d20f384a72fe97214eff1864b7fa2674c37224b71309d7d9cea4e36abd24a45a0e65f0c61dc5ca161ec7c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_real_estate.json
Filesize67KB
MD59899942e9cd28bcb9bf5074800eae2d0
SHA115e5071e5ed58001011652befc224aed06ee068f
SHA256efcf6b2d09e89b8c449ffbcdb5354beaa7178673862ebcdd6593561f2aa7d99a
SHA5129f7a5fbe6d46c694e8bc9b50e7843e9747ea3229cf4b00b8e95f1a5467bd095d166cbd523b3d9315c62e9603d990b8e56a018ba4a11d30ad607f5281cc42b4cd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_reference.json
Filesize56KB
MD5567eaa19be0963b28b000826e8dd6c77
SHA17e4524c36113bbbafee34e38367b919964649583
SHA2563619daa64036d1f0197cdadf7660e390d4b6e8c1b328ed3b59f828a205a6ea49
SHA5126766919b06ca209eaed86f99bee20c6dad9cc36520fc84e1c251a668bcfe0afcf720ea6c658268dc3bbaaf602bfdf61eb237c68e08d5252ea6e5d1d2a373b9fe
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_science.json
Filesize56KB
MD57a8fd079bb1aeb4710a285ec909c62b9
SHA18429335e5866c7c21d752a11f57f76399e5634b6
SHA2569606ce3988b2d2a4921b58ac454f54e53a9ea8f358326522a8b1dcc751b50b32
SHA5128fc1546e509b5386c9e1088e0e3a1b81f288ef67f1989f3e83888057e23769907a2b184d624a4e4c44fcd5b88d719bd4cca94dfb33798804a721b8be022ec0c6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_shopping.json
Filesize67KB
MD597d4a0fd003e123df601b5fd205e97f8
SHA1a802a515d04442b6bde60614e3d515d2983d4c00
SHA256bfd7e68ddca6696c798412402965a0384df0c8c209931bbadabf88ccb45e3bb6
SHA512111e8a96bc8e07be2d1480a820fc30797d861a48d80622425af00b009512aacb30a2df9052c53bfbf4ee0800b6e6f5b56daa93d33f30fecb52e2f3850dfa9130
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_sports.json
Filesize56KB
MD5ce4e75385300f9c03fdd52420e0f822f
SHA185c34648c253e4c88161d09dd1e25439b763628c
SHA25644da98b03350e91e852fe59f0fc05d752fc867a5049ab0363da8bb7b7078ad14
SHA512d119dc4706bbf3b6369fe72553cfacf1c9b2688e0188a7524b56d3e2ac85582a18bbee66d5594e0fb40767432646c23bf3e282090bd9b4c29f989a374aeae61f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\nb_model_build_attachment_travel.json
Filesize67KB
MD548139e5ba1c595568f59fe880d6e4e83
SHA15e9ea36b9bb109b1ecfc41356cd5c8c9398d4a78
SHA2564336ac211a822b0a5c3ce5de0d4730665acc351ee1965ea8da1c72477e216dfa
SHA51257e826f0e1d9b12d11b05d47e2f5ae4f5787537862f26e039918cb14faff4bc854298c0b7de3023e371756a331c0f3ee1aa7cebbbf94ec70cdfc29e00a900ed1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\personality-provider\recipe_attachment.json
Filesize1KB
MD5be3d0f91b7957bbbf8a20859fd32d417
SHA1fbc0380fe1928d6d0c8ab8b0a793a2bba0722d10
SHA256fc07d42847eeaf69dcbf1b9a16eb48b141c11feb67aa40724be2aee83cb621b7
SHA5128da24afcf587fbd4f945201702168e7cfc12434440200d00f09ddcd1d1d358a5e01065ac2a411fdf96a530e94db3697e3530578b392873cf874476b5e65d774a
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD577471112cc269b64bfffd444f3e91803
SHA1a5ecd52e5ca6ac2a22d1a81eaa67afd75a19886e
SHA256d3db04fff1d7c337a37aa42ac01201e828762fbbecf2e847f52405c9befdf568
SHA5125ab09759a605efb79dd370529c60066236914b9ca5e54192a4a1516ff0e3e3625ef71522730d1048f41488913c6a6b02260b045eb3f6ad38969d5ae976d3c1f4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD5c8a84fce7cd7f51d1e8eb0aca3e6fb7f
SHA1801358269e63045934591af07509fa40432aa43f
SHA25693a561e58afe8acba79a1c01ad6da915f3634f0d3affb6c5edf0a057c5b0d2b8
SHA5124c30c484e74786501af2a54880ac6864ce65c334179b2dfd87d1d81313ef0bc433a9471252f0ec4a90c67fa7e24187087e9275a4537a6b389df1ed221827fa0f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\AlternateServices.txt
Filesize743B
MD5846f7e9ae02be9680b3c382459a9fba9
SHA129080016485bc0599967fc072efdacdde2f24913
SHA256f682c1e6099b345c3c96a7251bf4df517de1dd44299e4a91b191ce764dbcfcfe
SHA51238bed232dc24739baf92cb92f84580e683d0c91ddd457d9915170a1bd283c852ea14aafa5e42924694f94c7ee8b274ef5ceed6700685f364a2f20fa3bf03bf9a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\bookmarkbackups\bookmarks-2024-07-03_11_Y1cFFi04jczTRYQpOVWYQg==.jsonlz4
Filesize998B
MD595d95458bda378706a401df4df9000f5
SHA196489335fe8f4f44ff52bdec588f5b5ded1e8dec
SHA256472eda9e614294604e4452c3828bc89e8a6936c5e0f6b9e4a95f5aa005c89f9a
SHA51280490f36436210325d4bc26253b602114ca5d4839c9f0ae3174705862f08f8286984ae656ae8779164e20f9e5eb0bc264196da273ba04eef5dea14dd74073115
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\broadcast-listeners.json
Filesize216B
MD550b6a2c56a2397a310688767224a0650
SHA118f6178f76246ca6e61d96cc936c19c562997a26
SHA256c185b158a38f55653bd1d18d0b839b61151e88516f82573858b7084e8a1b513e
SHA51295c22203caef23efa991153fabdd59b9a8b947cb1ada52bbdcd84c941b4ca20168223bf52426265b28b28b9bc528df08b0d73bfb9df391bebea2de6e5c29bea3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\datareporting\glean\db\data.safe.bin
Filesize182B
MD5c58234a092f9d899f0a623e28a4ab9db
SHA17398261b70453661c8b84df12e2bde7cbc07474b
SHA256eaec709a98b57cd9c054a205f9bfa76c7424db2845c077822804f31e16ac134c
SHA512ae2724fc45a8d9d26e43d86bcc7e20f398d8ab4e251e89550087ace1311c4d2571392f2f0bed78da211fcb28766779c1853b80742faa69f722b2c44c283569fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\extensions.json.tmp
Filesize37KB
MD5c91d6c06ffbb677905c3598ec8a7604b
SHA1965938d1dbd0e89d30a9a71fe607e6cdc13003e1
SHA2568508eebd7bd9b51bdab1e7c851adcdcf00c68c516514c73b2c8dc8682ed5da1b
SHA51260a4225b290277a44f27c08279d05f3e112c725fe065cd15f266c1acb30de6790a7716ea6d90dc790f5158e3e90beb610951ca82c80b1f302e977d4658c702cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD59c2a462d7038f794d9e6c8027f90b546
SHA161e46db803a85453a097183f28ecbbead5e18c9d
SHA256673266fe51b70df899963520a7d2015ea755d88b12a3f8e5f43b5f7957b9c3c6
SHA512b46951f0a529b0813791368035f09f71792a101c457aae611176abfa362e2b9c1b1b8345abd0f05d7d60f10944d131a6de3be204d96bdfb2cbfe2dbb9f97f3fa
-
Filesize
11KB
MD5dffb762089987d1d6620a5de40274409
SHA148e09b57b22723bea0f064b124e4f08e0370db97
SHA2568f0459f16c3967f28d2ec7bde080d61bb72675561e39d4132c9255bdfc27eb9c
SHA512f918dc4e62ba3cf8b950c4f52e6af5609c0347e717705c00143aec0fa4bdef9c673e1bf499c26453176c6057eafe25e61fa8915361b2b7966e98a0e40ad0f043
-
Filesize
10KB
MD56b9c7ea16af15375a955ba7cee10e956
SHA18a2f56bc44b1e2bd3693ab72220f0e9e496ed8d3
SHA256a7066f453257f29da22adfb9c9bbf35dd574815c1a4e0645716b59d8bab441c5
SHA51227450726ad6a20f739ee5e751f461a49ba58ce8de5761e9c3d8db92360762a44a0673e0239a81c15578e021a4f6ec7019942422555657b2e72cb86e00940e148
-
Filesize
9KB
MD54f7f63d0eaf21bec7428f52b60e81264
SHA1e2d060122c96c519ffe1b824d8765330a0319215
SHA256007fdb9a3b42078881bd32754068a9d7fcd96509829a5f9bd5cfdb065734c41a
SHA512101f26780f8f769bc53c3d4010f2cd12d5eec6b382ddbfa6d4191f41b9a358b789f327126697083231eab05dac1865e5972536fa89cebaf15e05eaffd1346d00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD546bc628d569db2444bea7054233591e7
SHA1f17051a8c4f4c80e025e9c275dc7df8d2e1f3be3
SHA256b62a4318fdf084c5153a11817910c792f73947ebf76ec7fd1fcc61d1b6126d34
SHA512e40b52a4a129e2f76863732aedefc4b69319359aa83b0cc302bbaadd2b5216615af21ce36aa564eb66732bc22c5284e5ede5dddfb21168923928c2653da1ebb6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD57fd752b4282b3d4077768c9a5a73ae9b
SHA19a57a82427c504ffbd08b05f362fe3cd385003ce
SHA25645838f601e536f0757b14f6ed7277885a9104b8edfb001409f24669528842feb
SHA512424a5931d751eee88d67ba135207b002bf0fb5375ffa7874656750eff3f5aef142d633143cd250f70da3632c4678dfdf6c1636d6b71a05293afe8fb396ebd8b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD536bc0bc088e0e3b51ba4f475ed4716aa
SHA104f82e61dfa0898c45d36a82c60538dcaca35469
SHA2564403c8691a59b063cc76289322a9120e10edb2494080b334229bae87ae854ffd
SHA512d01200a1f89cc38cee2375292b766a8f0f853a258bb3ccc5acb6fb2685d515375952a5a3c1a0d9638d421b1152910321b4a9362974157146fdc4ef74cce53239
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.0MB
MD50271fb97604fc2e018b10bf018e55932
SHA156cefc4e595fe6e9842e5ffbf4dee33f8c3a28d6
SHA256d86d593d45e605b48ce442daf262c4a34be9419a889667cf47da3ff6267b4dd3
SHA512dbe4b523a4edf8fdab251eafb39032a8a1de988b585e2083ac15fa4b1b5dec491f66cf5405f539dea2c23ef8749a5fd59a33f9795b0191319ee5c90751dfed9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize192KB
MD5b1de2321efccd18740dd89889cecff29
SHA1074d67ec00ac8c978831f07cde03ff95df26ec9f
SHA2562d1f75425568d1f60f55c33cb1ce941b61f30aa65fa8e90bb2fc05c310924b7a
SHA512e3d9d1d714043f2e8c0dd2e9e0dd1085fca639c2b21ed7f584b48b9af76adfbb6ad3a573220afa9d280fbf8d3f7b9f931e420029b3e3e02e984ae785328c07f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\targeting.snapshot.json
Filesize4KB
MD5d9d5d71fbdfb53e2ec485f1a26536ca7
SHA100a2dc3ad351381a08b1b109fdbc59caffa5652b
SHA2564bf3113230a5b26eff528d1ebd5799ea9e78e3624c428db86763eb8506c49bab
SHA5124203be8e046b6716696e9524cfadc2a7135170360897715bdbf73c9d9d65e16bd894bd53e936d7d90b9273fba9e1e5c14f73dbf7c31f3e723fe4c66b5fd5b981
-
Filesize
142B
MD5ecd04094c88a03716cc7b4feaa6fe3f9
SHA1ab78f9f3d7a4c05f1afed72cd234f48e47a63f0a
SHA2561e4e47a3ca967684be472cc202fa33de423f1a80228e1e0d814d488c0fe97974
SHA512a3ae8d68d69f2785b95744ddb4190205148283133c7db2c35b608d9b3ee701eabdb19f4a78e0871e810a759acfdc01ee4220b8258427e2cca6ae9a2102230057