Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
05/08/2024, 18:25
240805-w2sftsxhlf 1005/08/2024, 18:19
240805-wybznstglq 1004/08/2024, 18:22
240804-wzvs6ssamq 10Analysis
-
max time kernel
299s -
max time network
307s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05/08/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe
Resource
win11-20240802-en
General
-
Target
753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe
-
Size
474KB
-
MD5
ce49656e048c43c60317431abd383dff
-
SHA1
1f84d9865cfb08aeff1f995bc1eb90a6d87a0d9d
-
SHA256
753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8
-
SHA512
070385029413bb7d8ce31e235ae6800d69fe1070596a5886b23e9b65c0eaf26bd70203afdf99ef369e4bab39ed850fcd991eb0bdf74224bf873d47ecde120fdc
-
SSDEEP
6144:Ezv+ezl2A8GuozDKJDe6VlWT8b9IeArZCh3Z64sgmo9VkGIb3yuaPIPXb:ET+TfWzDKJDPVle8mvrZgmUmVam
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Windows\\TrustedInstaller.exe" 753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe -
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Executes dropped EXE 3 IoCs
pid Process 6116 processhacker-2.39-setup.exe 4812 processhacker-2.39-setup.tmp 2072 ProcessHacker.exe -
Loads dropped DLL 16 IoCs
pid Process 4500 Process not Found 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 5724 rundll32.exe 1760 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: ProcessHacker.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName ProcessHacker.exe -
Drops file in Program Files directory 42 IoCs
description ioc Process File opened for modification C:\Program Files\Process Hacker 2\plugins\WindowExplorer.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-HFORR.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-MRJDF.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\DotNetTools.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\x86\plugins\DotNetTools.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\UserNotes.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\x86\plugins\is-7LPCL.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-J091N.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ExtendedServices.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\x86\ProcessHacker.exe processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-C9PPH.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ToolStatus.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-MVB2B.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\unins000.dat processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ExtendedNotifications.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ExtendedTools.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\HardwareDevices.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-0KH0V.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-H793D.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-2NMI7.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-NO6O7.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\NetworkTools.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\OnlineChecks.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-LFGAF.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-69A2F.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-OGOPQ.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-ERII7.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-JV2VP.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-7TH5V.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\SbieSupport.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\Updater.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\unins000.dat processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\x86\is-BV60A.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-O44LA.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\ProcessHacker.exe processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-AOH8Q.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-QQQAO.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-TT0ND.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-J2TR2.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\peview.exe processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-RKG7J.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-5M668.tmp processhacker-2.39-setup.tmp -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\TrustedInstaller.exe 753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe File opened for modification C:\Windows\TrustedInstaller.exe 753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe File created C:\Windows\xdwd.dll 753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\Downloads\processhacker-2.39-setup.exe:Zone.Identifier firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language processhacker-2.39-setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language processhacker-2.39-setup.tmp -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters ProcessHacker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\Control ProcessHacker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 ProcessHacker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service ProcessHacker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf ProcessHacker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc ProcessHacker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\Control ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters ProcessHacker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName ProcessHacker.exe -
Checks processor information in registry 2 TTPs 27 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessHacker.exe Key opened \Registry\Machine\Hardware\Description\System\CentralProcessor ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ProcessHacker.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString ProcessHacker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ProcessHacker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz ProcessHacker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor ProcessHacker.exe -
Modifies registry class 34 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 ProcessHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" ProcessHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff ProcessHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg ProcessHacker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" ProcessHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" ProcessHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 ProcessHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings ProcessHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 14002e80922b16d365937a46956b92703aca08af0000 ProcessHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 ProcessHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 ProcessHacker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Documents" ProcessHacker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ ProcessHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU ProcessHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 ProcessHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff ProcessHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" ProcessHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" ProcessHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff ProcessHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell ProcessHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" ProcessHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff ProcessHacker.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags ProcessHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" ProcessHacker.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\processhacker-2.39-setup.exe:Zone.Identifier firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4812 processhacker-2.39-setup.tmp 4812 processhacker-2.39-setup.tmp 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2072 ProcessHacker.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 59 IoCs
description pid Process Token: SeDebugPrivilege 4460 753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe Token: SeDebugPrivilege 2764 firefox.exe Token: SeDebugPrivilege 2764 firefox.exe Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 4812 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeIncBasePriorityPrivilege 2072 ProcessHacker.exe Token: 33 2072 ProcessHacker.exe Token: SeLoadDriverPrivilege 2072 ProcessHacker.exe Token: SeProfSingleProcessPrivilege 2072 ProcessHacker.exe Token: SeRestorePrivilege 2072 ProcessHacker.exe Token: SeShutdownPrivilege 2072 ProcessHacker.exe Token: SeTakeOwnershipPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe Token: SeDebugPrivilege 2072 ProcessHacker.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 4812 processhacker-2.39-setup.tmp 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe 2072 ProcessHacker.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2764 firefox.exe 2072 ProcessHacker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 4324 wrote to memory of 2764 4324 firefox.exe 88 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4516 2764 firefox.exe 89 PID 2764 wrote to memory of 4492 2764 firefox.exe 90 PID 2764 wrote to memory of 4492 2764 firefox.exe 90 PID 2764 wrote to memory of 4492 2764 firefox.exe 90 PID 2764 wrote to memory of 4492 2764 firefox.exe 90 PID 2764 wrote to memory of 4492 2764 firefox.exe 90 PID 2764 wrote to memory of 4492 2764 firefox.exe 90 PID 2764 wrote to memory of 4492 2764 firefox.exe 90 PID 2764 wrote to memory of 4492 2764 firefox.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe"C:\Users\Admin\AppData\Local\Temp\753d66621ae168b5968406b8c2ad1845f1c9bf42f47556e7646d14e8484adeb8.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4460 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "TrustedInstall" /tr "C:\Windows\TrustedInstaller.exe" & exit2⤵PID:5460
-
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "TrustedInstall" /tr "C:\Windows\TrustedInstaller.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5532
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1944 -parentBuildID 20240401114208 -prefsHandle 1876 -prefMapHandle 1840 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bda68622-4158-4411-b36a-4ba0fa0e7295} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" gpu3⤵PID:4516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2348 -parentBuildID 20240401114208 -prefsHandle 2344 -prefMapHandle 2340 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ded7bf8a-2fbc-4edc-bef6-5e47298bf30b} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" socket3⤵
- Checks processor information in registry
PID:4492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2828 -childID 1 -isForBrowser -prefsHandle 2932 -prefMapHandle 2812 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67fc4b9d-3161-4fcb-8e52-85d92667741f} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:4496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3456 -childID 2 -isForBrowser -prefsHandle 3484 -prefMapHandle 3576 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa96d582-1714-415a-8f98-c8948be5e790} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:1032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4740 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4776 -prefMapHandle 4772 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9bd5ed0-1cce-4aaa-8eed-592e606ab18e} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" utility3⤵
- Checks processor information in registry
PID:5400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5104 -childID 3 -isForBrowser -prefsHandle 5032 -prefMapHandle 5072 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0516c10f-59d2-4c9e-bd04-3bdf01eb7105} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5228 -childID 4 -isForBrowser -prefsHandle 5236 -prefMapHandle 5240 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62739c15-6928-49ab-bae2-bc2a1f06094e} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5444 -childID 5 -isForBrowser -prefsHandle 5520 -prefMapHandle 5516 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f025c570-2e04-4ccb-8283-ab78e9013e1e} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6128 -childID 6 -isForBrowser -prefsHandle 6120 -prefMapHandle 6116 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ea7f881-862c-42a4-b009-6c7fd69c264f} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5028 -childID 7 -isForBrowser -prefsHandle 5188 -prefMapHandle 5204 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc67e0ef-c9c7-4729-a95f-cdd0a78a318a} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2712 -childID 8 -isForBrowser -prefsHandle 3960 -prefMapHandle 3564 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bad7fd87-2c0e-447a-8b0f-aef835bcb558} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4592 -childID 9 -isForBrowser -prefsHandle 4500 -prefMapHandle 6472 -prefsLen 27777 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f5a9e92-4c4b-4dcd-850b-9e07275a0428} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:1120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6600 -childID 10 -isForBrowser -prefsHandle 6680 -prefMapHandle 6676 -prefsLen 27777 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5dc652d9-2e63-4cc4-99c2-617828010293} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:2928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6964 -childID 11 -isForBrowser -prefsHandle 6960 -prefMapHandle 6976 -prefsLen 27998 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2c3bc75-74d3-499b-af20-0c8061e27dba} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7104 -childID 12 -isForBrowser -prefsHandle 7112 -prefMapHandle 7116 -prefsLen 27998 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {18d9e0f5-0629-4e9f-a94b-083c0144aab1} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7316 -childID 13 -isForBrowser -prefsHandle 7324 -prefMapHandle 7328 -prefsLen 27998 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c976b1e-977f-4ef1-bd13-9f5cd4ee4095} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:1244
-
-
C:\Users\Admin\Downloads\processhacker-2.39-setup.exe"C:\Users\Admin\Downloads\processhacker-2.39-setup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6116 -
C:\Users\Admin\AppData\Local\Temp\is-8FS37.tmp\processhacker-2.39-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-8FS37.tmp\processhacker-2.39-setup.tmp" /SL5="$9010A,1874675,150016,C:\Users\Admin\Downloads\processhacker-2.39-setup.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4812 -
C:\Program Files\Process Hacker 2\ProcessHacker.exe"C:\Program Files\Process Hacker 2\ProcessHacker.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks system information in the registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2072
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6588 -childID 14 -isForBrowser -prefsHandle 5100 -prefMapHandle 5196 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {632676e0-267d-46ba-97cb-0693781d90b9} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7248 -childID 15 -isForBrowser -prefsHandle 4540 -prefMapHandle 7236 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ca814894-5b7c-4407-a061-ceb0cc174961} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7264 -childID 16 -isForBrowser -prefsHandle 6960 -prefMapHandle 8272 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {27e9a01d-8eac-470e-b5e3-419397057cbe} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7128 -childID 17 -isForBrowser -prefsHandle 5312 -prefMapHandle 5396 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1352 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6327e6a3-6524-4114-ad21-71f25bbc13c2} 2764 "\\.\pipe\gecko-crash-server-pipe.2764" tab3⤵PID:5172
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
- Loads dropped DLL
PID:5724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5b365af317ae730a67c936f21432b9c71
SHA1a0bdfac3ce1880b32ff9b696458327ce352e3b1d
SHA256bd2c2cf0631d881ed382817afcce2b093f4e412ffb170a719e2762f250abfea4
SHA512cc3359e16c6fe905a9e176a87acf4c4ed5e22c29bfca11949799caf8442e00ec0d1679b3d8754dbc3e313528d3e8e82c0ec1941e2c3530b48229c1cb337f6b8b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5vinb3pw.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD5c2f08eb6df317ce4fac167413443453e
SHA1fbe43cbe53d13cc2bec285bc066216819951838e
SHA2560762dd2fe6053eba0b236a44c82f05a087bb40d24c31a8e94d915c2e6782c2e7
SHA512b8f606739e08ebae458c4087a842142a2b5fd65679c92dadeaefbdf38372905d727f31a1679e8766a1ebe639bbb618dc9a8a5735f9d730696c96d5a5a259dc2b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5vinb3pw.default-release\cache2\entries\47D7E4B1B65118F0E74C2FAE14D4EFE0712B3533
Filesize139KB
MD53ff13bd2a5b700a6e0c8abbca5068c1f
SHA16f1e809cd7236430498e3d411e5958b2b24f0884
SHA25688329a73eb6da8486b668a3f6bd3f249833b56dc91325955e6d5c2ad9c82f5ac
SHA5124934d0c1725d43da88d6753b8dd8a581f03f8d688d4cd77ac088be9f11c0af8e9f02a9888f955ac08cc5a65625e1eda4b742661a7329f5b447ba30c70a4c1d27
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5vinb3pw.default-release\cache2\entries\70D4B933DB0A168E9C9E8BF4AC9C05B6553086A5
Filesize41KB
MD559a067fffea1ed3ca3bfec934060478f
SHA143a3d93234a6547cdd37bdff7393a73c6a6e95ce
SHA2569d3b06a51b9368a73e517fed4c714a8577140694e5343b0c33daae3df014bcc4
SHA512e5e5567d51ae6bcabc4e81c8600230edc777b4b0f5756edc9a59c4fb69a3d0d946a1ebcde747ff5eba1f773cc6d1dd1ba1632e59befff902e753f307c6754c0a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5vinb3pw.default-release\cache2\entries\AD525AE91F8D63419653596829AB9B1342CB5750
Filesize1.0MB
MD51f65dd7a9198719502215bdf28012085
SHA11c22b875f9c2157eabd3a01914bd3bba0f803cd7
SHA2560c3b2047974b83b1dedd1cf2318c75fcce794bbf3a3eeb76bd6975d38f42e2e5
SHA5129b65049427fe26d05f9e508a3f4140d146b3047550fdd6e2c3bc59c981f7ce9009dc1af3c1cd35690d656979655404fd4af611aa01c143783f2492501c5154fb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5vinb3pw.default-release\cache2\entries\B032CA6F8E87FA80D9D81B2565B54F03E6B8527F
Filesize122KB
MD5b27868fdc39572f2dd1177390fb39909
SHA1660e3366ffb5920f4a41842c4c727bcf14503713
SHA2566dbeb70f3348dd5050dbab09cc65d03d7bf808ebcfe3448dff24c54acddee3bf
SHA51293a10794f63dda5e9e4c731a0a9d318d2cf7f57b6721cf8a852e606f74dd059e2a06fa8bd2e2327d97aa8df98af7bf183093c4b8ae242e930051aea14ddfd29a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\AlternateServices.bin
Filesize21KB
MD5b88fe99bc2e45e5b7c028bee0bb261b8
SHA1daebcd830447623c0587bdaddefa185b9c166f29
SHA256d74fa2f23f5624aea7e1ab78c125886cf1f351ce006b0f80188e81f8068a6bad
SHA5120364a426610e34f2825954d7c12cd41cae3eb1a5e5310f1c7ec516a70dbd70c6c40a592d8a79b72f42a515fc8e4666e7e25751f13d4f12c13a8d28d8809e9281
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\AlternateServices.bin
Filesize6KB
MD5957ffae1c75155566ad72bc2a8c2df04
SHA14aae1c57aae8580ef24228ab92e05dbcefb679da
SHA2569a985b45c4e11658d960f288035f2cf973513de7ee86d15ead7f6c756be78c2e
SHA5125ca8a950ead04d1215625f94cb4b9488376c035d58f73dcd71b76875aacbdf14a991a06cbc9b6dcfdb7fde0ab6df591848efabdaac055f8e295ea93869393424
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\AlternateServices.bin
Filesize7KB
MD5ca8abcf798b1a55a2f00ed9315c4fedd
SHA1317f37d360c5aa12439a67dcac4d3be3f930cba5
SHA256f091825ab0f98b909a203eaf2a143c81211897ef56ed801ae8c4143d6bc50f9c
SHA51263af4f2ee76e6156570a0b0a32a13a6efb74463ee0a182c5f596c51bd3b0dd67193784b088683c4b6f75b02d0ba144abb75d45c6eacb117ed7ebb05241bd5172
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\AlternateServices.bin
Filesize8KB
MD59c31e2c1a193c51677ac58b9de4edf44
SHA1e105d2a911074e2a56f7d9a560c2e0a24dfc7567
SHA25626c61915a4ba6eb31fe69aa6aab82b604d05afefa981abedc8740ea204c11ef9
SHA51249e46af6c000243698dc34dbca4bb2c9970151221e1f6229621a0343417255f0a7e245ae9eb6aaf7c9fe788115aea76bc1d8553feee243ee775d5c45f8f97b5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\AlternateServices.bin
Filesize10KB
MD54c621eccb5b0e3532c0820169c9240e0
SHA165abf7b5d65f5ca4acc0851fe0dc6d70ef558695
SHA25622665c3b562dcc59059585b57560dee7c0165e767c0bd6d182ac33c28bec1f92
SHA512b8e7299cad0eba04d115aa423ae1d796d88f2005f4e0605ff55ced1ab87fa897021916d9276f357d39cfa362a00f0fd00847f5d5733b8a8eb1834c088bf39d6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\AlternateServices.bin
Filesize16KB
MD53e495241df0e7082d171535f75d704d4
SHA153a60eef957e5072230a8424bcb8b4f5a7cbd643
SHA256551b3633487f73425703d371f008937a7707520425cc33852bbce7359baa5de3
SHA512125d44d3819464ef9d5f65aee0e134d1907b080b477f9b4ce5e922d59f71633a1cee1ac43ef782d51b26879ddd6c1ed139743359d4d4bd970c2170c24a530861
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\AlternateServices.bin
Filesize16KB
MD571cad539d558591927689da0447070b8
SHA1a1faa2c34610f0d93abda68b12c8fc9cd3ef8b3c
SHA256ac7a2ff715ba1448284600c6656f2d4b63850eee91b5390f6d807542fe99ce0b
SHA512566f14bb2aaae3c8c568223765f8757255853da7aaec2b1955ad63cc076628b6fdc0ddf1a7cc1e78b0adb18e07872cc7a5b83bcb4f1b57098e7aba2ecac3736e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\AlternateServices.bin
Filesize18KB
MD51372db4ad7bcefe8d1c1be237b180ffa
SHA1b4666c5455b5cb62054acc3f2cb418a8d3919f1b
SHA25661fcd255a23dfe7e2f19baa76b34c92b60e1ef375c7fe5b69b9386b725d786e6
SHA512266266e9415dc9aad73b10a86a56282f5b27e460f6cbc27c6f9729fd415b95fe9ef9659aff9669607136069efb0ff63c7b587d139ae65234f38c471aff32c40a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\SiteSecurityServiceState.bin
Filesize858B
MD5dc3bc469a9692b9575dce6ec8c6bb0c9
SHA16b3f48b163d2417c777bf985a99c9e9ebc52498e
SHA25608739df413563cccefafc29c617c2d1cc6ba00ec2d1cf55bc891e3963d7a782a
SHA5129d3c7ed4c9881ed17524e054457d9277fb3747b2ebfcbe7f203189bac67de7c61d6e25c21dc0154a88fed81cd990fe6769547fc98faecd81684b6996f1a0db40
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\SiteSecurityServiceState.bin
Filesize1KB
MD5ef45dba18da2d68d6371e87cb34d769e
SHA1ba516bc2a775075b7061e908b442f26adcbca9a9
SHA25663edd8b9374d6c5725e37d3fa4df62f1bb7725741f5aca6dd7aacf12d047538b
SHA5124c4fb6e8d0f54acae97499a86b083d166867666919fb257f99f431560a8ffd520aa8c97e73ece2041a4147920309293fe4e5d7004c7092e0e0b2f22542496f19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\SiteSecurityServiceState.bin
Filesize1KB
MD512ac8f115da2ecdeb0d475f82cdac2b7
SHA1d80a8b6284cb2bb12ff1973b0e2001ba58f7f066
SHA256086d171a696c287c58fade61469e5d69bfa112988e55c8abb8ac225e195b3fa2
SHA5120464f4c7a87eb665ee6e8975713268816f5a677d026d29ae665dbd6566821c9fb0b834803c4ca3feb8f70ee1ce5a405564853de80bf93e261fcef5e81a3befb7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\SiteSecurityServiceState.bin
Filesize2KB
MD5449c9fd1d4071629fac5cd7e8fc5bfb8
SHA151cfd2166564e08b36a5cd8bc728bc914c943e7f
SHA256e57ffbbe09275fd39182247d632ec330249a70a05acce33a5e206e12fc88cf3d
SHA5128df63fa887894220155c25a5760ad282cebdfe0e149eef30af2c7e2b4deb1055932f76c3a2b6405f7257fcc85b4910724d1aa29933859362ba6f0f782debc884
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\SiteSecurityServiceState.bin
Filesize2KB
MD5248b1fcf6f6aef3c8423ad58050aaac0
SHA1404fc0427183ae44f78afdf934e77420da57adc2
SHA256c55cc321e3f91ebd48e1c8246c6bd6762ef43a56e8a88496352571544927a4f6
SHA51254c275041482d1583a43c48e2ef27ad89f719f050202b6a36d9a8e77bbedcccd1fc2a0b766856869e88477d06041282bd6a0153a5c7344eecbcb3ad4849792bb
-
Filesize
224KB
MD523930b98923ade9b4e95c9c4ea1b8970
SHA188b602a7b14c9130c7779dcef2fae5efd4905924
SHA256c9e857079a569648f92c5d9628d717fddb02632a80f320f8b795303b0800d40e
SHA512a1fb6efb8416090124575852be4177cce60fdbdbb1f1275d694a53845d254c50d073d96f89f4c0378e86eb119b8e59e9e3f6c153bc2aaa4f7b87d7a007e8a9f2
-
Filesize
224KB
MD50baeb014038911bd0216365f80f5a118
SHA1e971f73a34f44090e058a72ca314bac9aaaf4eb3
SHA256c1aa73bb59300a223a7e070b811fb39c7f5a6021a5a416d43711e35f6ce82289
SHA512db4d98839539cc65c787967e8e6b3be236c8a213729190c1a307945f686fa63d137324ff308f1dc248579cae31b9fa25ac6fa46c3a150692e8b8f64f5886c63e
-
Filesize
224KB
MD54b4f5330ae6a06bf704e980c828810ec
SHA169831a47a62e6cf7842e1bf23e50269082d98f27
SHA256f950f66705dc09b6c40f38d69f930cb44fa4f65032363c93fb6d5f5afa2bb994
SHA5127463af615506ff7579d52a946b7a302c2fd191307a4959d34f2b8191a60f0bec8c3cd06a70a6025c76edf149b12313655242539c0e0b825d249cbcd9bc1b5968
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\content-prefs.sqlite
Filesize256KB
MD5b5acd9cf58ba89e643e7b2e839e0707e
SHA182c2b9cbea4acb50b446b786818287be7b0b8b61
SHA2564d4fd87f1cdccc9f826ab7de2b3980db6fe4ed328f079ceb24f680557da9667e
SHA5121fdaf5173a2fa956e3793b3643b44d928a4c81a1599bdf4b057396bfca5948ce1097194dbb5f528959c8cf4e34d058922828236c6060b41510e9ea2cb9ed424b
-
Filesize
512KB
MD5bfc14fe4d0127fd52083551a17d0d705
SHA11cbf5eea093bdf4b336b9da127858e727d35af85
SHA25606be63c0dd9ddf6a48fcbf70a2d2c846f81e0214e365a7d152386019ce97037c
SHA512c89711a57195f124f070cf3864b8e7b3afe7c627f7555e220dd1f5095b264df7f243eaecdec21f86089a6cc7b657364f1d73f3cbd716b8391f2786d8382736ce
-
Filesize
128KB
MD5f0e797f4492a80bcf7757b263dca27ce
SHA18c431080a01a180985895e12c3a60cd591d321b1
SHA25647b80b83445a98c6669beb2a8807d28e16295eafd47d558c1aed20057b4e7e42
SHA5121daf726cfdfbb9d64884924e7526e2967cf1900dfc3cc661016eae7961cf85f76c88cd78516cfa39556504ed51e6d28d5d55ca71a16a9fcd0a51c2c256cbe624
-
Filesize
192KB
MD56220b75c4c72b6cedad33deb0a9ef702
SHA1c80292f25328128a54b67a58e844a815792bab96
SHA256c9762bcaf19b47755b7ef4f620c5954e96df0ef503a2e6e1fc4803a48d744bf8
SHA512a766c61cce618b3b404140fb918fab43828b7ee8657f35143f285e532a9c805b9df494a8fa0fd2c6e8e40c9844dab45db41e70e1b559a5617c9e9fbcb24555d6
-
Filesize
448KB
MD56e8b6c85b2ef0f8941e25980ed336cd0
SHA1456bde8c9f65d49ead64265c095d434d8a31bf64
SHA256b729644397e2b605cc1abe64dc7daf7532e0e4a4558b457b28517f8fecabdfc3
SHA512f39ea90f9cd1ac376280db38b8377379f64daf87fc118cacc61871abdc4029af580dc81d119bea57f9b9b894b33f70f468022c9883e182369a77aa706312e18e
-
Filesize
512KB
MD5d236eb7fbc8b64d39f0d7e9f481ca4f8
SHA1df91be2e2c8a63fe829b3ee0854ce83552ae1b48
SHA2561a204abd13c07ddbde45638f42f83d26acf94300be5af15ac2737b63e4c17259
SHA5124bad9c847a90bf0b9f391cc25309be2dc824e54756a16f8112b5dc29f61ce10028aef7da5d6fe3f5cf62b614fd19f51f769f243f2dc1edff8476347c8bebe38c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5f71ec09290e9494cd9f50b04ffabc22e
SHA1bae068a87793facae10f0ad8a05832e9c4ddd524
SHA25662cc1abdf4bb8682fefa19063f0582802c275286e448280036fe90eb98e11a80
SHA51224862b3283f6a2436aeb6d77a95e3211540622477bce2954bcb16e3af941303d87c0234b8162298d0120317eb984dac295b6a1522b18c7469a0ed2a1c76fd7d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5b67e65b34d63d5eb884e31899c94ebba
SHA1d1ff5fcd40fdafc5cb002f81560dfe0434770851
SHA25688c258c9d38c583317ff2295cb0618c80e5c60798c1f059e95c4387dcb5983ca
SHA51203b09bd7fcd2d4e80c6bdfa5730a04d12f97ce3f4ebc64c38f47b198433ca31639e67fda2457484f33744aa51a7eab00bf64458fab4f64b25a622f61efcad0df
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5edb01a1e0a5ec8844dd7c1beb28116ef
SHA1f82baed54147cecec41f1c05d3481553a3de8215
SHA2569230ff7e02785c4c973da1c85ead27c356c06992651f7b8e2f2109c1a95150c4
SHA512a1cc822be76d8787eb6cd45d39572fa2585d33e3c9776f80551fbdc8b6b857d7d75fd1ed68c67812c35a5aaed169dc90e039409453779ba64785ee565d67279a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD59e562d294ba9162ad86250f26272e509
SHA102a90a2aef5f3c5f3404210456a881f944e22199
SHA256f2edd41e9333a0356a503bbce83c6a99c49b49bd9ebf0b5fb956f2216ae4d6e9
SHA5126301f6a1a5fe28643f394f638e76e2eb82b63e53405f8b802ebe1bdbf4c0dfd6dc74004803a478bc0cb988c809c67b8a93ee3aa6e72d93cb8b8cc5bdc4e670dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5723c83a96d4311c1ce89eee78b2ce252
SHA17b6a89f296eb76c2b8055f16a1c2de4917a9d998
SHA256aa10818b0203ce1d300ebc6591fdfb4fb098ee7b231388f58caef9bc939d82b9
SHA512cd5acd05444ac32de81dda761d52bf6e39590c1e800f0056b45bc577ecca912f2f03a75fce0563f50b1696b02016551bafd09e321de2433993bc6109b9f56aa8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a0e667b58de475420fa476483a45b4a1
SHA15f688effffa9378bc895c9bffb1e7c607e0adc07
SHA256397d801900140bb8c8868fb58e3cdc331c1383532aef47b605795c139ea8c6c1
SHA5122b59a49df3afcca4fd1b896bbcda66524516400af9b6cdf14ec33293ba48d410b85d60b77324689cdcf8417c606f3ac64641de7c09fdbd7527698917cb54f85c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5525915ab8efa99c5fd68e7ae4cc0f505
SHA17d1ed9e9cb1007871e979696f4516862bfc45d45
SHA2568dce38a85e43bffc144592bdeeaa9d33b0d3adeeae8a4fe84e9bc5f97e790fb2
SHA51289c72cb9171abd7572bd6779d7ced9536a2f8e69fe685af6720173b2934b0e4c91bfad5e32991678a8522ce5127abdeea3dbcf7ea8d7e7bea648e68369509be1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\db\data.safe.tmp
Filesize70KB
MD5504ae836e46e25ba2a03e909e00bb281
SHA1d7aee6c979ae39953769d52292ac33a564587515
SHA256201e6513aa44dbeed505220d1da1744b5bfba41f7b4ab788825ebfa5799ab694
SHA5120f799f5edcb772db3fa7a3598c48bb1e688cedf1845db70512880befc64f2c5ee9c973ff271aa24312aa0a50bb81d6534a49fdc3ab51ca35ca8b295811c4beab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\events\events
Filesize104B
MD5defbf00981795a992d85fe5a8925f8af
SHA1796910412264ffafc35a3402f2fc1d24236a7752
SHA256db353ec3ecd2bb41dfbe5ed16f68c12da844ff82762b386c8899601d1f61031d
SHA512d01df9cab58abf22ff765736053f79f42e35153e6984c62a375eb4d184c52f233423bb759a52c8eed249a6625d5b984a575ca4d7bf3a0ed72fc447b547e4f20a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\events\events
Filesize786B
MD543a1fa3c1345cba084ae7f427b949b2b
SHA1f7a2a0ed9b20a9d1f0f6bb95eac521c6fadd9b35
SHA2560c36d1b951a9ac3c9e2d6594e573f7314988c0b9a49f01946323a43c494226c1
SHA512b1759242172015d61906b2432f14ef72e6d05233c6ae154be9543d2a4601e13e3cfde4069774b8c7c57b947e4b031dfae15ec8c7ea73ffeb9b33b635bf8d70dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\events\events
Filesize1KB
MD5ff455d4b58d95239a193a7be817c1500
SHA12f926cadf86e399247ac6a7b908c41f9ede7723f
SHA256cdbf5d7864b473f0ccdbf4398460315087960753a20326c751d8d8b737ce5a43
SHA512289adcf3094cc928e8c0621245024513e2c98e9549cdc7ec9fb76fbda41e835e3a5917f3fb2ef63b81ff914c19b17cc40b6727f5ff47256a2bd88c3d5b0b594d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\events\events
Filesize1KB
MD5c00252d91cd77dbc4db0161d54ecffd0
SHA1e74c8d66e625dbf0f6fe75aeea42b14df14d6453
SHA256b67ec4e4f98a3ea0e5a7c837e2f4e8afcdfeffd5c506217d3cf9c7ddf82a3a28
SHA5120875cf74269236b9940eafaa3483c876f36a9544c5adbe29b6c6de29f92df9c8e9fcad09a1133d253ab2442a30e8be210235fc18db5c28ec533a3188eac61733
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\events\events
Filesize1KB
MD545a0ea28a2f5f1d0cf5c508d5d075b6d
SHA1f0fd390612b291ab5e323552529b9d9fe0dfa8ce
SHA2563c07dada0d9b18966424a6651e133c679c65ada2c5b179cd3d6e33a80f3d3a98
SHA5125c65a471f9d1148e53c7f1723611e068269f02cacff64eab66d52e35669633f2bc73b8d1148c884113f91154b174f0c91e50bbf125f44706f8c8a5658a1361d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\events\events
Filesize1KB
MD529e921cfc6e089f1f1b826f08b29292d
SHA170ae6ded15559ab8155e1695c2f8f941c9e8370c
SHA25673d14e1968c380321ef95efeded2b00d0eb1c0fef3f8370406ac3070e4b1ee9c
SHA512a04e8a3febb730bda3884e62f4bbbbef727dd41d0d07d3788ea892b33c078b004a77b01cf4be0357173de29511b1b5433f9f2dfe90084c111d89c4e26e20f6a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\events\pageload
Filesize217B
MD54dab4de33d0b1660b23ef84eec923f8c
SHA199e48d1bb8eb58062c24b9b550d96e476ffe667b
SHA2563f2f37f5c9768950ed70470797a00fa47fa27d17bc0690733f5af1994e1a594f
SHA512d4556355a528e10677c8a2d1634c36721fc39fbcb91674693eb50aefac72e03e8459eac1cf97638758c29ec519fd39fbd0d470c7c825bc01dbf556c03655194a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\events\pageload
Filesize483B
MD5f5b92facfaa14745ee628a19606b2cd7
SHA16cd79ab128820ff0b96d3ac3313b06008c7b54cd
SHA256d1656ed57e48de0fa0529de4d69c47471c935f0a13afb01f149e8b3004ca6e16
SHA512ecadf34c1d9d8d33f4d57d66fdc63732d766bf8d6e719dd036b46a0c7438d06f71448f0035e939bd97cc6daa2145a317a033ef3be37656a9a0491758370025b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\events\pageload
Filesize704B
MD5dc629cca78ea68068629c2746a9acf53
SHA1a7d4bee662ed349353f97479dac5848bbecbefa7
SHA256d8d9472ed4eba23e85751a3bb792631f3e32b42679c5e102f67fb54818c6439e
SHA5124c20d09b47620d7e2e40a21c14478f2a95db1f5bdad20691ac5aaac14e0d6f3ee90c737f2ef842e12600f44c4cf92477776de76d5c5c6adcd1da0230433f2946
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\events\pageload
Filesize950B
MD5c860e089a1be00e6b65fe3781e779cc7
SHA18daacff03ff207ecd6861e96a4ebf3480de05a34
SHA2567e9944f2e5f8392ad05d0e4ede48cb7c7ae73166714d532203d4b55f5b968d69
SHA512c55c804b637f7dae85fd507db08dc854d2f278819b7c7fc5582eaea4e1b00e59e9095639296a4d617f4adb7c92e9428da5aed170010cd6845015d96ccfc0c583
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\pending_pings\09357f94-7496-4982-866c-96012075532c
Filesize25KB
MD5e79cd642da815226c5d08d0993c2ded2
SHA1046558d4fc1ff735059f34facf11e65c7993f25b
SHA256fe56d4755eff89948dc629917f085588a9675fce46aa0594c2386926a0f75db4
SHA5129f9ab675d083774ce6431db0f5703cb70c1a33d4823aba9a1c298806a9b184177bce82822dd9538f50ec323a8c010a17f1434fdb4dc5e5267a2a211925be0384
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\pending_pings\97b9116e-76b7-4b85-af75-09827858292c
Filesize982B
MD53cf3724107a9727839a40520e3206bb0
SHA17bfda381ed7bae2dee33f9f957fb72b05f6fd34d
SHA2566708a9870df593c6b1c770fb5ce0539e12bdb12a0ef7beefe20099ce470053b0
SHA5123fc76d05f5eefdbb76572a55937ec3cb3f798a3e5ce8ef7e8a2c5019c74f2d3d5eedf459bfb6d671832663b49e85ef981fc704c313841232c6181d926858ae26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\datareporting\glean\pending_pings\e285c78f-8849-4bd4-b460-087249c4548d
Filesize671B
MD5bb461f19c97ab7da354b549e090aa5ff
SHA1117fb21dad968f08387aad0805d986abc8c283b9
SHA256f30db54aba12acdf3948b028ad2ead2aaea889e521c249073e13a8debc19cdb7
SHA5121774b0ac75bd8d4b8c0a60751f36fca4a59badddd4b9b335bc93de6ee2d441d7a48469a538c0ed56e729cfee0cb2ef7ba61ac5dfc3cb4691056bfadc412c38f8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\favicons.sqlite-wal
Filesize64KB
MD546066983cfba1ce8da09e0fb9f230d5d
SHA1afdb231ea75fce7550189f88890b72b54ab6f6f6
SHA256ff6d5058481ca913bc61be4394fa830dc5154283741ee32ccd77cf91e25de950
SHA512a26c89f4114e39c0e7594d2f4aa98e960a0f181245dc987e96d0773c999ad0675e6be9c5bc5c25035f7f041932f710666b4900266be801baee01f8a8880bb702
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\favicons.sqlite-wal
Filesize416KB
MD5bf4c69c059b1d501f4e0f5019f5b0385
SHA1eeb3101a26240402ded82d4ccd61329c765412b6
SHA2569e9cc4ca168657fbf4bc16590e2310a30fa0686db7b1044201c9df0234a6896c
SHA5126560860828b2f7989f9328bd9fefc677c80eb79c748e4b288ee7bb8387a25706e2e27fc81cb3225d3f81a78e151ccce30cd7c3842580e00dea372112c012fd94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\favicons.sqlite-wal
Filesize736KB
MD5a53c7a119380e0a9696b8bb616a3fd74
SHA13c495aec289281c6274b02c3d8b9ec87f6827e01
SHA2560e68ebee3890eb3708a7b465c05e1ab71b18b14cc7e56d8573c65fda7a9f5da2
SHA51283839e05df8ede9543e2faf1d335a4d8aa1d17075ec5034c7eb6e3dffcd457ac88990174e9350b854531bf6c8eb679aea707212ebcb7f7c2624d60c275098f3c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\favicons.sqlite-wal
Filesize800KB
MD57ba2c6a925e7e876ca8afce37e53d467
SHA1141093a328501c5c227f8b89101b56ac7df5133c
SHA256289a8b42cb02b577a59a103e78e59b123baea5200a852db275c057c60e2c46da
SHA512439756b67d811f741b18e4c784c505fb0c18a11cc4728c5bfbc2a9264c722ec420863c848a534b15c373f920dd666ac8dc4af4a87134843ab8c17f3f25329d53
-
Filesize
256KB
MD520ac702e48e291fc4d0283d296230c87
SHA156fbad321f086a819b98eb23fad98816ab208760
SHA256838c3c04a7295712eb161d6b96ddc5f163d958adc6c0c31598878f6cd5991938
SHA512a28e137c30c106e6f71e207d95176165cce55db840719eaf719697f0d90cdb38418192fb5fb23f3b3db6f0c2fdfe2ae81b01b362aa8297ac09108dba6e71eeb7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
96KB
MD5b1b5aaa0e6842cf3c115a9761d49bea9
SHA1dc5fcd818249ad37a36e85dedacdc660d579d944
SHA25638c5709709285c98cfea67fb5e073a1cc241f1c4d7e0ecc846cc5a4e54fccb02
SHA512327ee318dfdecb53f9dff732ef1eda3ef09761886e228d8c7d1ef0761430b7cc3efd9e0c6ade78f99a34f7c17acedd1a12cf0a9a56b1c91c9bc7b2aca9fc8374
-
Filesize
96KB
MD554e51341651f7e979b887b4130aae8fa
SHA1615f9a4258096ef2d8c57d26d8fe39cb5cfc9528
SHA256b188bcdabc52b150a4af95b46de16025f87c0f824eb9b85621d4d9175a654bac
SHA512a5efb9cee52806a34ef36b960b3f25b0301b79734c56395932ecd2a65f24da19b7ba94e4eab8b5983469496206caad9e8117cf1d30798db4120644c307460d6c
-
Filesize
96KB
MD562a571a80d922e8490125a40022f272b
SHA150461c3962b062623b36d19c3113306f6a18c421
SHA256babe018c125da7c7355d88e48772401b3fb50523369f129b3905dc1b62e36ed7
SHA512bd83246cfa8b375ed939a3baf18fd28df5311391f9bcd32885560f9a97488c82a18390e32a371862e5914f2c7e8b5840b383d793dc1a19218354de77371eada1
-
Filesize
96KB
MD56c75b9dff225804d50835fb462935d8b
SHA1cfee3ee87013dbe0ed4a1258737e560058cdfea2
SHA2560615c1ffafd08bffb9cfe0bf495cf954041653c65b61f410fc60c90478a56cc4
SHA512d213e8e8a528714c98fb366553140845b9dbc146a966fe1a66ec4422f7fc77cd44af8e90cfee1c8193b453db142b7946de9711b815e0e12568a3381a7a13035d
-
Filesize
96KB
MD54f1e0cc294d5f2a90ae31cd69b2bf8a2
SHA1c177d3af174f17db27ecb8c80f5e05e93f9520ab
SHA256d2e3c7689034333365ef7b50e3a1ab869f4a2ddef36f35a35f7515fe981f8f0e
SHA51244784c528d4aafc48da5ad15ea2879e88325e1d27135aec3795f22205ff470e2e197a8138872eac44a69442072c6af71aa544e965a004c20bdce481d1bc4db25
-
Filesize
5.0MB
MD5f76dc6c4d28e7c54e3aa946644854dbe
SHA189a6777968ac69659bc908928bb03aa74e11964b
SHA256da82066f2a2509037acb468a551b55263310ebb5ca7883828812910b91e86caf
SHA512d777681658f1553a226e63ad7a094f002fb353b8495c52de27282762c5e1da9f61ee1275e0747d8b6b29b08ad028090239ced924dd3c3c99979d95cf123420ee
-
Filesize
928KB
MD513bb0718b7334a6e74e71f951823e7cb
SHA1d75804d9c25ecf07e97eec62dd63f5a440fdacab
SHA256579cf10790450425d70e23b18ae4a1b6a02a3172ba13611aae43aad0b3635fb3
SHA512df3fb9e06e338062d682a1766ae288a126578a1f20fb7f65415239894320e103a1a535600513073384f8d9b37fe3b856e2989559b821d9f16dd1e5e2c0b9ec45
-
Filesize
1.9MB
MD57babc0a758b3b91a402e32bebd5bdfa7
SHA1900c1cc3da7973d93117b03eecc576e40ce7f5c3
SHA2566152eaeda34285203d8aa5c416afcb46ed6edc61070b18090c2b4b23ae4524ae
SHA51227d2c7681a9fd050a13b5443f334cc70443e25b7650c4d1acd43b53e34f71ddc036070b36a69941415891d7cf4193cd53dde346689a7eacd93b8de8b1db653d1
-
Filesize
2.3MB
MD59501acb74cf35e08f57b81ab65b0211c
SHA158766751a2303f031f91e00a00d4e6568a402619
SHA256a86a6015927af073301071f33bab5f9c16fcb10d599a7c04de8ac83b4d0c0927
SHA51201b2522b8a3de95c831eae2ca06df5bdd272db3537818a61639a0733ac1366505081aa21eb44f4ca037c931845a262a8b2f231f9ed49fa762026d33d520ccc5b
-
Filesize
2.3MB
MD5a60f2f72a467186f37c96ee6da9ba624
SHA1535ac28482715b827480de14fc698d3f7a11f36d
SHA256da5c69b0b348c4ec05097f3835cc906d4faf3ec067b7922e4ffd3292547ce2aa
SHA51277d244d8ca629817405a590618b55c606ed03080a96d8fa83e024a79ef8b46c72d8277db65d69745f5dd10280c8e680155100ef3d59ba132343df607880c9edc
-
Filesize
2.3MB
MD55018bf5e2f6a44a4fc2d54ba3e9bc148
SHA1251cf7e12d7cba116a48685a1f9c53e2f421b95c
SHA2560be261b361eac9dea2bec6afdf87f7997ee60268518d85f6d19ade45ac0456f0
SHA512da9cfce855e28fa204db4acfacd4773336dc0f5c1da691c1d678154f5eb4015defbb0281c8824c4ae3e5bcc26f0b5a0f0a21f4275fdad35c942729fc143aafcf
-
Filesize
11KB
MD57f9b8c7bcea454a0a3ef3c14fa92fff2
SHA12154d851ac4ba583480b1426d82f6790d7a74e64
SHA25687bff78f1e5444bfbe80ca92048f9cdee580d026810d84f3d7cebbfde292a0d3
SHA5127fe601ed270e9217c0d12392a5f15881e60c426f62b5232776fb1be4996123921ee4b646e50c928a5ce88755c497c207304bc41b5ee6347e99f951676d670f89
-
Filesize
10KB
MD5279074472b78d89918dc554a1253ba9a
SHA153dcebe2dc98f46559aad5e55710b61a398b7443
SHA2568b903082f47846d784020643983b9cb59192f12759c2a5cbef315cad3be629b4
SHA512b619c0da82d313c867b537b07753a24ca3644bdc53a3eb7edb224412242b00b6fc45355784b2ca08189c3213b357462b054fe0ddd55c56a7b73a861ee2c1059b
-
Filesize
11KB
MD5e3f53654c9d86b02a4965fb4f1daf626
SHA1b0e5629ce01c102f7cdf9613fad0bc6cc3a25ed1
SHA2565b2bf8fb70353379164b96be10b30d781fb3700bc06af3cfb414e65721ea82c4
SHA51240f2b0789aaa96717b090ab072687a719d0384ace56468c1ad84e4bb96654d2c7535707b0272e3f4eed4b541e722bdad1c8407994f7b5f692c424593a01e72f9
-
Filesize
11KB
MD5821bee8a6c6bb045dbd2581feda638a3
SHA191a4ebdc5207dcc593e8cad116d49b5a801fcdad
SHA256d5b08d24a6c8a0b29c019d5d3605ce11e3987a99e910093294562b1c97847352
SHA5123cce1dc096a4a5e7aab28664a0dcc2530c6eed49c92590670ad053dd8e8d8db8061e8e7aaa7060f4cbf142989b6e151eed492c11c0ed523c9e40fb8393b12e24
-
Filesize
64KB
MD5d7e5433a87ae3a30de4ab9adc47023bf
SHA14edaec48083abd90bc532ba8dd015fe209b0e439
SHA256c2da29c9c40900e9ae211f9083849b86355850faa503062d14ced549563f273e
SHA5129b28c36dbe02dff99519fac684c8cb88b8a40b06454524ebf79e576bd22cd94ae0eabb2655aba32bc118767f645d4e12da06764ca5d73c4e42fc2c2e0c343961
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\sessionstore-backups\recovery.jsonlz4
Filesize2KB
MD56b57342c69d9813e2ae130c0f1173502
SHA16a5c3d111f46aa62bce89bafe9e385b0254eae73
SHA256f205ccd8012660ee4c84caa653e0b80f1af473d37657fb32e9cdd53a04430093
SHA512702f22100597d3e8e2db9fd99a86b17ab9ccc4b96e567a10670beb75f610f3e3ef72f395caa2d9b462b80d8f2fe49a261e4d85de009c1bfae4e721a5723d11fa
-
Filesize
4KB
MD5059b2ff6f7d80594a2c3ddf610eeb76c
SHA18a7709265c0067ac4371ebeb62b93fd2407f8a1e
SHA2561f15aa35b799dc7de17cb71291a4bc96a942048fa4f8ae43934ecfe5ff6c4a1b
SHA512e717c5dedb0d456fea52b70c4f7def798612bc64e3541fd444d53ccc2b1078a8bb100f3563bef7201353c01c600f66e891883931edbfdc7a748aad347ea7c911
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\storage\default\https+++www.google.com\.metadata-v2
Filesize52B
MD57b77de3a41225e8e1f445368115bf836
SHA19e808db7800cb056cc26f16fcf3910388e1104ab
SHA25677cfd8f8ab7da725380c8f19fa67e4b0695408f63b76795127a1a6aa3a366db0
SHA51293d7baf76da00ee0987b819834206e99189deb3f3f2677cbaff89a9fb97a50ecbe339036168e861d2fe6b7a8a615ac025445098c66c0a2d52a3416eababf702b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\storage\default\https+++www.google.com\ls\data.sqlite
Filesize6KB
MD5b438b28317a3afb900d10d84cedb07b0
SHA1c90ebe64ae51901f1553e15e88ab63e3c73250e9
SHA256233f26a8cbdbca3c6f8d82f7d82a94d39cabf1868acea8f20346338e479b9129
SHA5127e5925394a60d4cc7f7a3086611ce450af2e21fdc702123b12652d7dcc5bd6458fec4ed13ae4e918b015f6b1c2cbac63d6728d248aa01701b96307677f1943d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\storage\default\https+++www.google.com\ls\usage
Filesize12B
MD50fcc9ca45becfcb1c35ee12471dd7efc
SHA1caeeb53d8599a54963f63697b92f4a280aab1422
SHA2561aacce17ed04ab8a3e30fcf89612ac917351e9153af50efddca91c21eacd5444
SHA51272e234b6522991bc93edf9cdee6e08d91bb4f11f8ea1d9cc06a780aa61161253b32bc07db746e56e911f1dfaef4cf14b95f2132ae4bbea2275be6c9b5ff97853
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize576KB
MD582755625189cedc13b6aea3344e6f365
SHA18b7e227562cce69b14c854d8e801391374ea9136
SHA256da59891ef0ee702c5ca5250d641d08e37892c9915f978b55bb79785028831687
SHA51213319870bd130b8e2d804ab4effb8991114be8ca87be14becc5166a8e3f6fdf70e561a37c6178270e9f3c3e4e0038d903a88d0f91b8677c9dd8896f41498a4b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5vinb3pw.default-release\targeting.snapshot.json
Filesize4KB
MD54726aefca9f22131f535be197c0990c8
SHA1a29cf2359c882fc193c65572824769a976fbbd13
SHA256b6c1a735e70f7b67f170e0e21d737b0cb00dadd1b4ef635682135c3f646caa83
SHA5120161fc4ee00caab5c597845ed9892232f629b5d0ba883cfe3b3fb3a73ea23c33d34764b3ef98b10619bf4dda5d0c5207fae0eaad7158ccc8ed1f5984a73a67ba
-
Filesize
186B
MD54e75c1f85d08cefc882c23d26698472f
SHA1182d75281306c9b904434efebb9c2ed09df7253f
SHA25695d52e85291729194cbb2fec09c3287438394af2aa79f60cb0cb93572fe1952b
SHA5129ab670cfff4122c9c535f35482eaaf7d9f7232619a2aa22f9fff33b8c433f482a5a5140efa5544ec4e31185003a0e2d400d756b72f2ac70d5be24b46ae67f794
-
Filesize
2.2MB
MD554daad58cce5003bee58b28a4f465f49
SHA1162b08b0b11827cc024e6b2eed5887ec86339baa
SHA25628042dd4a92a0033b8f1d419b9e989c5b8e32d1d2d881f5c8251d58ce35b9063
SHA5128330de722c8800ff64c6b9ea16a4ff7416915cd883e128650c47e5cb446dd3aaa2a9ba5c4ecda781d243be7fb437b054bbcf942ea714479e6cc3cef932390829