Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2700s -
max time network
2701s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
SteamtoolsSetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
SteamtoolsSetup.exe
Resource
win11-20240802-en
General
-
Target
SteamtoolsSetup.exe
-
Size
1.7MB
-
MD5
dd410c316152077eb8a683ed981fc787
-
SHA1
360b90cd99dd9ead20b21e50c73a3d0fe10123c1
-
SHA256
036128ca60c543609bf2c6c362e2f909c85f1760d4a8d6b07c55b73d36d9df0b
-
SHA512
81f4dceebe93a89b239076937df31bf28542b23ed8e383ca9b30cbdcd89b3d8683fc8fff9c78d74c1ced281e766cb852b54b6c5b5640b6cb0224b66c747d8657
-
SSDEEP
24576:nkcCSfG0yWS7woCNAi1GoCaLI4/gPGHOV1VVW4Qn652aPOrjB9:kcCSe0yT7wooAi1GhWI4oPGHOVVWvcC
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation steamwebhelper.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation steamwebhelper.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation steamwebhelper.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation steamwebhelper.exe -
Executes dropped EXE 32 IoCs
pid Process 5572 SteamSetup.exe 5488 steamservice.exe 5896 steam.exe 8520 steam.exe 8308 steamwebhelper.exe 8264 steamwebhelper.exe 8084 steamwebhelper.exe 7992 steamwebhelper.exe 7676 gldriverquery64.exe 7616 steamwebhelper.exe 7560 steamwebhelper.exe 7264 gldriverquery.exe 7244 vulkandriverquery64.exe 7156 vulkandriverquery.exe 18608 dismhost.exe 19872 Steam.exe 19988 steamwebhelper.exe 10656 steamwebhelper.exe 11344 steamwebhelper.exe 11132 steamwebhelper.exe 5832 gldriverquery64.exe 12016 steamwebhelper.exe 11928 steamwebhelper.exe 2120 gldriverquery.exe 6156 vulkandriverquery64.exe 6448 vulkandriverquery.exe 17924 steamwebhelper.exe 15428 steamwebhelper.exe 5660 steamerrorreporter.exe 20036 SteamtoolsSetup.exe 21844 steamerrorreporter.exe 22708 steamerrorreporter.exe -
Loads dropped DLL 64 IoCs
pid Process 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8264 steamwebhelper.exe 8264 steamwebhelper.exe 8264 steamwebhelper.exe 8520 steam.exe 8084 steamwebhelper.exe 8084 steamwebhelper.exe 8084 steamwebhelper.exe 8084 steamwebhelper.exe 8084 steamwebhelper.exe 8084 steamwebhelper.exe 8084 steamwebhelper.exe 8520 steam.exe 7992 steamwebhelper.exe 7992 steamwebhelper.exe 7992 steamwebhelper.exe 8520 steam.exe 7616 steamwebhelper.exe 7616 steamwebhelper.exe 7616 steamwebhelper.exe 7560 steamwebhelper.exe 7560 steamwebhelper.exe 7560 steamwebhelper.exe 7560 steamwebhelper.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe 18608 dismhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -silent" SteamSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 17636 powershell.exe 23452 powershell.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_010_wpn_0070.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\shared_buttons_s_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\shared_gyro_pitch.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps4_trackpad_l_click_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\resource\filter_banned_polish.txt.gz_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps_outlined_button_circle_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\localization\steampops_koreana-json.js_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\localization\switch_controller_latam.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps4_trackpad_right_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\ghost_100_target_0170.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\localization\steamui_french-json.js_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\ps4_trackpad_r_down_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\switchpro_rstick_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steam\cached\DeleteCache.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\icon_button_back_down.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\switchpro_dpad_up_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\sc_dpad_right_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\joyconpair_left_sr.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps4_button_options_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps_button_circle_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\sd_ltrackpad_swipe.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\[email protected]_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\win32_win_min.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\sc_rg_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\localization\dualshock_4_hungarian.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps4_r2_soft_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\SteamOverlayVulkanLayer.dll_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steam\cached\Receipt_CDKey_Success.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_100_target_0080.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\shared_dpad_left.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\xbox_lt_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\bump_paper_w.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\ps_rb_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steam\cached\DialogCheckForUpdates_Expanded.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\friends\icon_speaker_ringing.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\xbox_lb_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\sounds\deck_ui_tab_transition_01.wav_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\sd_rtrackpad_ring.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\switchpro_button_plus_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\xbox_p3_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\desktop_neptune.vdf_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\switchpro_r2_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\icon_vr_disabled.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\sd_ltrackpad_ring_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\xbox_button_logo_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steam\cached\LocalizedAudioChoiceDialog.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\sd_button_steam_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\xbox360_button_select_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\xbox_p2.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\shared_lstick_right_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\ghost_030_inv_0325.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\resource\SharedLibraryNotification.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\libx264-142.dll.md5_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\sc_rt_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\shared_outlined_button_a_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\shared_buttons_w_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\sc_dpad_left_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\sounds\deck_ui_misc_10.wav_ steam.exe File created C:\Program Files\chrome_ComponentUnpacker_BeginUnzipping19988_354887355\manifest.fingerprint steamwebhelper.exe File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\ghost_035_magic_0341.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\libraries\libraries~00299a408.js_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\sd_l2_half_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\sd_ltrackpad_click_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\sd_button_menu_sm.png_ steam.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DISM\dism.log dismhost.exe File opened for modification C:\Windows\Logs\DISM\dism.log Dism.exe -
Launches sc.exe 18 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 17884 sc.exe 20232 sc.exe 20440 sc.exe 20312 sc.exe 20500 sc.exe 4928 sc.exe 11408 sc.exe 11356 sc.exe 17868 sc.exe 17880 sc.exe 20472 sc.exe 20520 sc.exe 17452 sc.exe 23276 sc.exe 17724 sc.exe 20328 sc.exe 17912 sc.exe 20212 sc.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\Downloads\SteamSetup.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\SteamtoolsSetup.exe:Zone.Identifier firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SteamSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gldriverquery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamerrorreporter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vulkandriverquery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamerrorreporter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamerrorreporter.exe -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 Clipup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID clipup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Clipup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID Clipup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs Clipup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 clipup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 clipup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs clipup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID Clipup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs Clipup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID clipup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs clipup.exe -
Checks processor information in registry 2 TTPs 54 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steamwebhelper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Steam.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steamwebhelper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steam.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steamwebhelper.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Steam.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steamwebhelper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 13 IoCs
pid Process 10616 taskkill.exe 20316 taskkill.exe 2588 taskkill.exe 14452 taskkill.exe 16592 taskkill.exe 23112 taskkill.exe 6824 taskkill.exe 2044 taskkill.exe 16908 taskkill.exe 17284 taskkill.exe 17644 taskkill.exe 18532 taskkill.exe 22800 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133681147924342922" msedge.exe -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steam\Shell steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steamlink\Shell\Open\Command steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\URL Protocol steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink\DefaultIcon steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open\Command steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steam\DefaultIcon\ = "steam.exe" steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\DefaultIcon\ = "steam.exe" steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steam\Shell\Open steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steamlink\DefaultIcon\ = "steam.exe" steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steam\URL Protocol steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steamlink\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steamlink\Shell\Open steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\URL Protocol steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steam\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steamlink\URL Protocol steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steam\DefaultIcon steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\steam\DefaultIcon steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steam\Shell\Open\Command steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steam steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink\Shell\Open\Command steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steam\ = "URL:steam protocol" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\steam steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2170637797-568393320-3232933035-1000\{A528B85F-BDFE-4994-A2B2-8E699A63B4C6} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steam\Shell\Open\Command steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steamlink steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steamlink\ = "URL:steamlink protocol" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steamlink\Shell steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2170637797-568393320-3232933035-1000\{EF393919-6757-4679-98B0-5E4E9478C4DF} msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\ = "URL:steamlink protocol" steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\steamlink\DefaultIcon steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\ = "URL:steam protocol" steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open\Command steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\DefaultIcon\ = "steam.exe" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings taskmgr.exe -
Modifies registry key 1 TTPs 8 IoCs
pid Process 17908 reg.exe 1004 reg.exe 20128 reg.exe 17892 reg.exe 20424 reg.exe 20512 reg.exe 5032 reg.exe 20144 reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 steam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 steam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 steam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 steam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 steam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 5c000000010000000400000000080000190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc36200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8040000000100000010000000d474de575c39b2d39c8583c5c065498a2000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a steam.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\Downloads\SteamSetup.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\MAS_AIO.cmd:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\SteamtoolsSetup.exe:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 19256 NOTEPAD.EXE -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 5572 SteamSetup.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe 8520 steam.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 8520 steam.exe 19872 Steam.exe 13904 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1968 firefox.exe Token: SeDebugPrivilege 1968 firefox.exe Token: SeDebugPrivilege 5572 SteamSetup.exe Token: SeDebugPrivilege 5572 SteamSetup.exe Token: SeDebugPrivilege 5572 SteamSetup.exe Token: SeDebugPrivilege 5572 SteamSetup.exe Token: SeDebugPrivilege 5572 SteamSetup.exe Token: SeSecurityPrivilege 5488 steamservice.exe Token: SeSecurityPrivilege 5488 steamservice.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeShutdownPrivilege 8308 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8308 steamwebhelper.exe Token: SeDebugPrivilege 1968 firefox.exe Token: SeDebugPrivilege 1968 firefox.exe Token: SeDebugPrivilege 1968 firefox.exe Token: SeDebugPrivilege 1968 firefox.exe Token: SeDebugPrivilege 16592 taskkill.exe Token: SeDebugPrivilege 16908 taskkill.exe Token: SeDebugPrivilege 17284 taskkill.exe Token: SeDebugPrivilege 1968 firefox.exe Token: SeDebugPrivilege 17644 taskkill.exe Token: SeDebugPrivilege 1968 firefox.exe Token: SeDebugPrivilege 20316 taskkill.exe Token: SeDebugPrivilege 1968 firefox.exe Token: SeDebugPrivilege 2588 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 11760 msdt.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 8308 steamwebhelper.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe 19988 steamwebhelper.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 1968 firefox.exe 5572 SteamSetup.exe 5488 steamservice.exe 8520 steam.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 18820 firefox.exe 19872 Steam.exe 12764 OpenWith.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 2432 wrote to memory of 1968 2432 firefox.exe 108 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 996 1968 firefox.exe 109 PID 1968 wrote to memory of 5036 1968 firefox.exe 110 PID 1968 wrote to memory of 5036 1968 firefox.exe 110 PID 1968 wrote to memory of 5036 1968 firefox.exe 110 PID 1968 wrote to memory of 5036 1968 firefox.exe 110 PID 1968 wrote to memory of 5036 1968 firefox.exe 110 PID 1968 wrote to memory of 5036 1968 firefox.exe 110 PID 1968 wrote to memory of 5036 1968 firefox.exe 110 PID 1968 wrote to memory of 5036 1968 firefox.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"1⤵PID:4960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:81⤵PID:1140
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d090f0d4-6f8f-456e-b7b8-9c389a8dd3ff} 1968 "\\.\pipe\gecko-crash-server-pipe.1968" gpu3⤵PID:996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2404 -prefMapHandle 2396 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {846e832b-b348-437a-aaf3-e447dede100e} 1968 "\\.\pipe\gecko-crash-server-pipe.1968" socket3⤵
- Checks processor information in registry
PID:5036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2736 -childID 1 -isForBrowser -prefsHandle 2980 -prefMapHandle 2976 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8ed2112-9c48-40bd-8d43-81b87c250326} 1968 "\\.\pipe\gecko-crash-server-pipe.1968" tab3⤵PID:4072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4004 -childID 2 -isForBrowser -prefsHandle 3996 -prefMapHandle 3992 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab432060-983f-4d99-9408-b338f73c07ab} 1968 "\\.\pipe\gecko-crash-server-pipe.1968" tab3⤵PID:4224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4812 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4908 -prefMapHandle 4904 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20b4cb92-e126-4ff6-ae70-21800a92b863} 1968 "\\.\pipe\gecko-crash-server-pipe.1968" utility3⤵
- Checks processor information in registry
PID:5796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5208 -childID 3 -isForBrowser -prefsHandle 5200 -prefMapHandle 5196 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13081acd-9816-456a-b0bf-60232161564b} 1968 "\\.\pipe\gecko-crash-server-pipe.1968" tab3⤵PID:5816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5428 -childID 4 -isForBrowser -prefsHandle 5348 -prefMapHandle 5352 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e8f0307-74ba-48c6-a10d-807e963de1c5} 1968 "\\.\pipe\gecko-crash-server-pipe.1968" tab3⤵PID:5884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 5 -isForBrowser -prefsHandle 5540 -prefMapHandle 5544 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a033237-db53-4867-aeab-d3f0ead94f08} 1968 "\\.\pipe\gecko-crash-server-pipe.1968" tab3⤵PID:3492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5552 -childID 6 -isForBrowser -prefsHandle 5932 -prefMapHandle 5544 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e93b4363-55f3-43e6-9ac5-aabe800e8b4f} 1968 "\\.\pipe\gecko-crash-server-pipe.1968" tab3⤵PID:5792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6128 -parentBuildID 20240401114208 -prefsHandle 6180 -prefMapHandle 6204 -prefsLen 29525 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6455a442-113c-41ab-960f-d6e2c7e87c98} 1968 "\\.\pipe\gecko-crash-server-pipe.1968" rdd3⤵PID:4724
-
-
C:\Users\Admin\Downloads\SteamSetup.exe"C:\Users\Admin\Downloads\SteamSetup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5572 -
C:\Program Files (x86)\Steam\bin\steamservice.exe"C:\Program Files (x86)\Steam\bin\steamservice.exe" /Install4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5488
-
-
-
-
C:\Program Files (x86)\Steam\steam.exe"C:\Program Files (x86)\Steam\steam.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
PID:5896 -
C:\Program Files (x86)\Steam\steam.exe"C:\Program Files (x86)\Steam\steam.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:8520 -
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" "-lang=en_US" "-cachedir=C:\Users\Admin\AppData\Local\Steam\htmlcache" "-steampid=8520" "-buildid=1721173382" "-steamid=0" "-logdir=C:\Program Files (x86)\Steam\logs" "-uimode=7" "-startcount=0" "-userdatadir=C:\Users\Admin\AppData\Local\Steam\cefdata" "-steamuniverse=Public" "-realm=Global" "-clientui=C:\Program Files (x86)\Steam\clientui" "-steampath=C:\Program Files (x86)\Steam\steam.exe" "-launcher=0" --valve-enable-site-isolation --enable-smooth-scrolling --enable-direct-write "--log-file=C:\Program Files (x86)\Steam\logs\cef_log.txt" --disable-quick-menu "--disable-features=SpareRendererForSitePerProcess,DcheckIsFatal"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:8308 -
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=crashpad-handler /prefetch:7 --max-uploads=5 --max-db-size=20 --max-db-age=5 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files (x86)\Steam\dumps" "--metrics-dir=C:\Users\Admin\AppData\Local\CEF\User Data" --url=https://crash.steampowered.com/submit --annotation=platform=win64 --annotation=product=cefwebhelper --annotation=version=1721173382 --initial-client-data=0x368,0x36c,0x370,0x344,0x374,0x7ffac415ee38,0x7ffac415ee48,0x7ffac415ee584⤵
- Executes dropped EXE
- Loads dropped DLL
PID:8264
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=gpu-process --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1721173382 --steamid=0 --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Program Files (x86)\Steam\logs\cef_log.txt" --mojo-platform-channel-handle=1584 --field-trial-handle=1724,i,13596908687595403617,14364461437413461934,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:8084
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1721173382 --steamid=0 --log-file="C:\Program Files (x86)\Steam\logs\cef_log.txt" --mojo-platform-channel-handle=2220 --field-trial-handle=1724,i,13596908687595403617,14364461437413461934,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7992
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1721173382 --steamid=0 --log-file="C:\Program Files (x86)\Steam\logs\cef_log.txt" --mojo-platform-channel-handle=2516 --field-trial-handle=1724,i,13596908687595403617,14364461437413461934,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7616
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=renderer --user-agent-product="Valve Steam Client" --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1721173382 --steamid=0 --first-renderer-process --log-file="C:\Program Files (x86)\Steam\logs\cef_log.txt" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1724,i,13596908687595403617,14364461437413461934,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:7560
-
-
-
C:\Program Files (x86)\Steam\bin\gldriverquery64.exe.\bin\gldriverquery64.exe3⤵
- Executes dropped EXE
PID:7676
-
-
C:\Program Files (x86)\Steam\bin\gldriverquery.exe.\bin\gldriverquery.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7264
-
-
C:\Program Files (x86)\Steam\bin\vulkandriverquery64.exe.\bin\vulkandriverquery64.exe3⤵
- Executes dropped EXE
PID:7244
-
-
C:\Program Files (x86)\Steam\bin\vulkandriverquery.exe.\bin\vulkandriverquery.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7156
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x520 0x51c1⤵PID:7788
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:9336
-
C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"1⤵PID:16524
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:16592
-
-
C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"1⤵PID:16848
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:16908
-
-
C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"1⤵PID:17232
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:17284
-
-
C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"1⤵PID:17600
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:17644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4776,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=2496 /prefetch:81⤵PID:17756
-
C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"1⤵PID:20236
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:20316
-
-
C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"1⤵PID:5504
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"1⤵PID:18588
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
PID:18532
-
-
C:\Users\Admin\Desktop\SteamtoolsSetup.exe"C:\Users\Admin\Desktop\SteamtoolsSetup.exe"1⤵PID:22760
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
PID:22800
-
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:20824
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\activator.bat1⤵
- Opens file in notepad (likely ransom note)
PID:19256
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:10764
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:18820 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1876 -prefMapHandle 1868 -prefsLen 24856 -prefMapSize 245030 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f08b087-4faa-4d9c-a592-44a356332259} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" gpu3⤵PID:19064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20240401114208 -prefsHandle 2292 -prefMapHandle 2288 -prefsLen 24856 -prefMapSize 245030 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7cf333a-7539-40e3-ae9d-07693bee58fa} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" socket3⤵
- Checks processor information in registry
PID:19180
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3108 -childID 1 -isForBrowser -prefsHandle 3016 -prefMapHandle 3012 -prefsLen 25355 -prefMapSize 245030 -jsInitHandle 1440 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {159deaaf-99a9-4913-8f6c-bdc3e024c978} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" tab3⤵PID:19612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3940 -childID 2 -isForBrowser -prefsHandle 3932 -prefMapHandle 3928 -prefsLen 30588 -prefMapSize 245030 -jsInitHandle 1440 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4696338-566c-4b9d-a39d-1cc17d3b0e39} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" tab3⤵PID:19864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4772 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4764 -prefMapHandle 4752 -prefsLen 30588 -prefMapSize 245030 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71a620bb-4150-40c8-bb25-703f08493f22} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" utility3⤵
- Checks processor information in registry
PID:10976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 3 -isForBrowser -prefsHandle 4764 -prefMapHandle 4760 -prefsLen 28027 -prefMapSize 245030 -jsInitHandle 1440 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d3ad0a58-7f7c-480c-a892-86a0fe53afe1} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" tab3⤵PID:6204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5560 -childID 4 -isForBrowser -prefsHandle 5352 -prefMapHandle 5364 -prefsLen 28027 -prefMapSize 245030 -jsInitHandle 1440 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ef3a274-de3f-43fd-a5a9-f171c838bfcb} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" tab3⤵PID:6212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 5 -isForBrowser -prefsHandle 5692 -prefMapHandle 5700 -prefsLen 28027 -prefMapSize 245030 -jsInitHandle 1440 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6829a32c-e9d8-4591-b977-02eeccff2807} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" tab3⤵PID:6224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6008 -parentBuildID 20240401114208 -prefsHandle 6012 -prefMapHandle 6000 -prefsLen 30695 -prefMapSize 245030 -appDir "C:\Program Files\Mozilla Firefox\browser" - {911fa676-6703-4a87-9163-97bfbe7006d0} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" rdd3⤵PID:6768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6048 -childID 6 -isForBrowser -prefsHandle 6040 -prefMapHandle 6024 -prefsLen 28027 -prefMapSize 245030 -jsInitHandle 1440 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11a24661-b6c5-4022-8241-d75747be33af} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" tab3⤵PID:6756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3596 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 3440 -prefMapHandle 3952 -prefsLen 30774 -prefMapSize 245030 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51b8ef20-f40c-4105-b022-ac0396ed2475} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" utility3⤵
- Checks processor information in registry
PID:16088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6320 -childID 7 -isForBrowser -prefsHandle 6304 -prefMapHandle 6300 -prefsLen 28106 -prefMapSize 245030 -jsInitHandle 1440 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f435d98d-44ac-42e0-8071-236edf236a82} 18820 "\\.\pipe\gecko-crash-server-pipe.18820" tab3⤵PID:15788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\MAS_AIO.cmd" "1⤵PID:16700
-
C:\Windows\System32\findstr.exefindstr /rxc:".*" "MAS_AIO.cmd"2⤵PID:16460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:17340
-
-
C:\Windows\System32\reg.exereg query "HKCU\Console" /v ForceV22⤵PID:17020
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:17476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo prompt $E | cmd2⤵PID:17500
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "3⤵PID:17504
-
-
C:\Windows\System32\cmd.execmd3⤵PID:1932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\Downloads\MAS_AIO.cmd" "2⤵PID:17264
-
-
C:\Windows\System32\find.exefind /i "C:\Users\Admin\AppData\Local\Temp"2⤵PID:17220
-
-
C:\Windows\System32\fltMC.exefltmc2⤵PID:17280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop2⤵PID:17560
-
C:\Windows\System32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop3⤵PID:17240
-
-
-
C:\Windows\System32\mode.commode 76, 302⤵PID:9260
-
-
C:\Windows\System32\choice.exechoice /C:12345670 /N2⤵PID:17612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:3644
-
-
C:\Windows\System32\reg.exereg query "HKCU\Console" /v ForceV22⤵PID:16748
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:16784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo prompt $E | cmd2⤵PID:17688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "3⤵PID:17676
-
-
C:\Windows\System32\cmd.execmd3⤵PID:10024
-
-
-
C:\Windows\System32\mode.commode 76, 252⤵PID:17820
-
-
C:\Windows\System32\choice.exechoice /C:120 /N2⤵PID:17616
-
-
C:\Windows\System32\mode.commode 102, 332⤵PID:17704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe $AssemblyBuilder = [AppDomain]::CurrentDomain.DefineDynamicAssembly(4, 1); $ModuleBuilder = $AssemblyBuilder.DefineDynamicModule(2, $False); $TypeBuilder = $ModuleBuilder.DefineType(0); $meth = $TypeBuilder.DefinePInvokeMethod('BrandingFormatString', 'winbrand.dll', 'Public, Static', 1, [String], @([String]), 1, 3); $meth.SetImplementationFlags(128); $TypeBuilder.CreateType()::BrandingFormatString('%WINDOWS_LONG%')"2⤵PID:17832
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe $AssemblyBuilder = [AppDomain]::CurrentDomain.DefineDynamicAssembly(4, 1); $ModuleBuilder = $AssemblyBuilder.DefineDynamicModule(2, $False); $TypeBuilder = $ModuleBuilder.DefineType(0); $meth = $TypeBuilder.DefinePInvokeMethod('BrandingFormatString', 'winbrand.dll', 'Public, Static', 1, [String], @([String]), 1, 3); $meth.SetImplementationFlags(128); $TypeBuilder.CreateType()::BrandingFormatString('%WINDOWS_LONG%')3⤵
- Command and Scripting Interpreter: PowerShell
PID:17636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "Windows 10 Pro" "2⤵PID:17396
-
-
C:\Windows\System32\find.exefind /i "Windows"2⤵PID:2500
-
-
C:\Windows\System32\wbem\WMIC.exewmic path Win32_ComputerSystem get CreationClassName /value2⤵PID:17384
-
-
C:\Windows\System32\find.exefind /i "computersystem"2⤵PID:17188
-
-
C:\Windows\System32\sc.exesc start sppsvc2⤵
- Launches sc.exe
PID:17724
-
-
C:\Windows\System32\wbem\WMIC.exewmic path SoftwareLicensingProduct where (LicenseStatus='1' and GracePeriodRemaining='0' and PartialProductKey is not NULL) get Name /value2⤵PID:16668
-
-
C:\Windows\System32\findstr.exefindstr /i "Windows"2⤵PID:17344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions" /v OSProductPfn 2>nul2⤵PID:17552
-
C:\Windows\System32\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions" /v OSProductPfn3⤵PID:17540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic Path Win32_OperatingSystem Get OperatingSystemSKU /format:LIST" 2>nul2⤵PID:5608
-
C:\Windows\System32\wbem\WMIC.exewmic Path Win32_OperatingSystem Get OperatingSystemSKU /format:LIST3⤵PID:3512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTURE2⤵PID:9500
-
C:\Windows\System32\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTURE3⤵PID:3668
-
-
-
C:\Windows\System32\reg.exereg query "HKCU\SOFTWARE\Microsoft\Windows Script Host\Settings" /v Enabled2⤵PID:17796
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:17720
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows Script Host\Settings" /v Enabled2⤵PID:20176
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:20184
-
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\ClipSVC /v ImagePath2⤵
- Modifies registry key
PID:5032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Services\ClipSVC /v Start 2>nul2⤵PID:20052
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\ClipSVC /v Start3⤵
- Modifies registry key
PID:20144
-
-
-
C:\Windows\System32\sc.exesc start ClipSVC2⤵
- Launches sc.exe
PID:17884
-
-
C:\Windows\System32\sc.exesc query ClipSVC2⤵
- Launches sc.exe
PID:20312
-
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\sppsvc /v ImagePath2⤵
- Modifies registry key
PID:17908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Services\sppsvc /v Start 2>nul2⤵PID:17848
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\sppsvc /v Start3⤵
- Modifies registry key
PID:1004
-
-
-
C:\Windows\System32\sc.exesc start sppsvc2⤵
- Launches sc.exe
PID:17868
-
-
C:\Windows\System32\sc.exesc query sppsvc2⤵
- Launches sc.exe
PID:20500
-
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\KeyIso /v ImagePath2⤵
- Modifies registry key
PID:17892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Services\KeyIso /v Start 2>nul2⤵PID:20392
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\KeyIso /v Start3⤵
- Modifies registry key
PID:20128
-
-
-
C:\Windows\System32\sc.exesc start KeyIso2⤵
- Launches sc.exe
PID:17880
-
-
C:\Windows\System32\sc.exesc query KeyIso2⤵
- Launches sc.exe
PID:20328
-
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\Winmgmt /v ImagePath2⤵
- Modifies registry key
PID:20424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Services\Winmgmt /v Start 2>nul2⤵PID:13040
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\Winmgmt /v Start3⤵
- Modifies registry key
PID:20512
-
-
-
C:\Windows\System32\sc.exesc start Winmgmt2⤵
- Launches sc.exe
PID:20472
-
-
C:\Windows\System32\sc.exesc query Winmgmt2⤵
- Launches sc.exe
PID:20232
-
-
C:\Windows\System32\net.exenet start ClipSVC /y2⤵PID:17372
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start ClipSVC /y3⤵PID:20208
-
-
-
C:\Windows\System32\sc.exesc query ClipSVC2⤵
- Launches sc.exe
PID:20520
-
-
C:\Windows\System32\find.exefind /i "4 RUNNING"2⤵PID:20220
-
-
C:\Windows\System32\sc.exesc start ClipSVC2⤵
- Launches sc.exe
PID:4928
-
-
C:\Windows\System32\net.exenet start sppsvc /y2⤵PID:216
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start sppsvc /y3⤵PID:20080
-
-
-
C:\Windows\System32\sc.exesc query sppsvc2⤵
- Launches sc.exe
PID:20440
-
-
C:\Windows\System32\find.exefind /i "4 RUNNING"2⤵PID:20420
-
-
C:\Windows\System32\sc.exesc start sppsvc2⤵
- Launches sc.exe
PID:17452
-
-
C:\Windows\System32\net.exenet start KeyIso /y2⤵PID:16696
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start KeyIso /y3⤵PID:20524
-
-
-
C:\Windows\System32\sc.exesc query KeyIso2⤵
- Launches sc.exe
PID:17912
-
-
C:\Windows\System32\find.exefind /i "4 RUNNING"2⤵PID:11472
-
-
C:\Windows\System32\sc.exesc start KeyIso2⤵
- Launches sc.exe
PID:11408
-
-
C:\Windows\System32\net.exenet start Winmgmt /y2⤵PID:11384
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start Winmgmt /y3⤵PID:11368
-
-
-
C:\Windows\System32\sc.exesc query Winmgmt2⤵
- Launches sc.exe
PID:11356
-
-
C:\Windows\System32\find.exefind /i "4 RUNNING"2⤵PID:20224
-
-
C:\Windows\System32\sc.exesc start Winmgmt2⤵
- Launches sc.exe
PID:20212
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\State"2⤵PID:5128
-
-
C:\Windows\System32\find.exefind /i "IMAGE_STATE_COMPLETE"2⤵PID:6108
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE" /v InstRoot2⤵PID:7060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe $ExecutionContext.SessionState.LanguageMode2⤵PID:4396
-
-
C:\Windows\System32\find.exefind /i "Full"2⤵PID:3956
-
-
C:\Windows\System32\wbem\WMIC.exewmic path Win32_ComputerSystem get CreationClassName /value2⤵PID:11452
-
-
C:\Windows\System32\find.exefind /i "computersystem"2⤵PID:11400
-
-
C:\Windows\System32\Dism.exeDISM /English /Online /Get-CurrentEdition2⤵
- Drops file in Windows directory
PID:20484 -
C:\Users\Admin\AppData\Local\Temp\67F156CB-864F-468D-8C9E-A756D725DE87\dismhost.exeC:\Users\Admin\AppData\Local\Temp\67F156CB-864F-468D-8C9E-A756D725DE87\dismhost.exe {003CB82C-E100-444F-A58F-E9A530179488}3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:18608
-
-
-
C:\Windows\System32\cmd.execmd /c exit /b 02⤵PID:22648
-
-
C:\Windows\System32\cscript.execscript //nologo C:\Windows\system32\slmgr.vbs /dlv2⤵PID:22628
-
-
C:\Windows\System32\cmd.execmd /c exit /b 02⤵PID:21816
-
-
C:\Windows\System32\reg.exereg query "HKU\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\PersistedTSReArmed"2⤵PID:21496
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ClipSVC\Volatile\PersistedSystemState"2⤵PID:22260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform" /v "SkipRearm" 2>nul2⤵PID:4168
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform" /v "SkipRearm"3⤵PID:22008
-
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Plugins\Objects\msft:rm/algorithm/hwid/4.0" /f ba02fed39662 /d2⤵PID:22748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f') get ID /VALUE" 2>nul2⤵PID:22828
-
C:\Windows\System32\wbem\WMIC.exewmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f') get ID /VALUE3⤵PID:22832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform" /v TokenStore 2>nul2⤵PID:22696
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform" /v TokenStore3⤵PID:22736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path SoftwareLicensingProduct where "ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and PartialProductKey<>null" Get ProductKeyChannel /value 2>nul2⤵PID:23016
-
C:\Windows\System32\wbem\WMIC.exewmic path SoftwareLicensingProduct where "ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and PartialProductKey<>null" Get ProductKeyChannel /value3⤵PID:23028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "040fa323-92b1-4baf-97a2-5b67feaefddb 0724cb7d-3437-4cb7-93cb-830375d0079d 0ad2ac98-7bb9-4201-8d92-312299201369 1a9a717a-cf13-4ba5-83c3-0fe25fa868d5 221a02da-e2a1-4b75-864c-0a4410a33fdf 291ece0e-9c38-40ca-a9e1-32cc7ec19507 2936d1d2-913a-4542-b54e-ce5a602a2a38 2c293c26-a45a-4a2a-a350-c69a67097529 2de67392-b7a7-462a-b1ca-108dd189f588 2ffd8952-423e-4903-b993-72a1aa44cf82 30a42c86-b7a0-4a34-8c90-ff177cb2acb7 345a5db0-d94f-4e3b-a0c0-7c42f7bc3ebf 3502365a-f88a-4ba4-822a-5769d3073b65 377333b1-8b5d-48d6-9679-1225c872d37c 3df374ef-d444-4494-a5a1-4b0d9fd0e203 3f1afc82-f8ac-4f6c-8005-1d233e606eee 49cd895b-53b2-4dc4-a5f7-b18aa019ad37 4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c 4f3da0d2-271d-4508-ae81-626b60809a38 60b3ec1b-9545-4921-821f-311b129dd6f6 613d217f-7f13-4268-9907-1662339531cd 62f0c100-9c53-4e02-b886-a3528ddfe7f6 6365275e-368d-46ca-a0ef-fc0404119333 721f9237-9341-4453-a661-09e8baa6cca5 73111121-5638-40f6-bc11-f1d7b0d64300 7a802526-4c94-4bd1-ba14-835a1aca2120 7cb546c0-c7d5-44d8-9a5c-69ecdd782b69 82bbc092-bc50-4e16-8e18-b74fc486aec3 8ab9bdd1-1f67-4997-82d9-8878520837d9 8b351c9c-f398-4515-9900-09df49427262 90da7373-1c51-430b-bf26-c97e9c5cdc31 95dca82f-385d-4d39-b85b-5c73fa285d6f a48938aa-62fa-4966-9d44-9f04da3f72f2 b0773a15-df3a-4312-9ad2-83d69648e356 b4bfe195-541e-4e64-ad23-6177f19e395e b68e61d2-68ca-4757-be45-0cc2f3e68eee bd3762d7-270d-4760-8fb3-d829ca45278a c86d5194-4840-4dae-9c1c-0301003a5ab0 d552befb-48cc-4327-8f39-47d2d94f987c d6eadb3b-5ca8-4a6b-986e-35b550756111 df96023b-dcd9-4be2-afa0-c6c871159ebe e0c42288-980c-4788-a014-c080d2e1926e e4db50ea-bda1-4566-b047-0ca50abc6f07 e558417a-5123-4f6f-91e7-385c1c7ca9d4 e7a950a2-e548-4f10-bf16-02ec848e0643 eb6d346f-1c60-4643-b960-40ec31596c45 ec868e65-fadf-4759-b23e-93fe37f2cc29 ef51e000-2659-4f25-8345-3de70a9cf4c4 f7af7d09-40e4-419c-a49b-eae366689ebd fa755fe6-6739-40b9-8d84-6d0ea3b6d1ab fe74f55b-0338-41d6-b267-4a201abe7285" "2⤵PID:21920
-
-
C:\Windows\System32\find.exefind /i "2de67392-b7a7-462a-b1ca-108dd189f588"2⤵PID:21228
-
-
C:\Windows\System32\wbem\WMIC.exewmic path SoftwareLicensingService where __CLASS='SoftwareLicensingService' call InstallProductKey ProductKey="W269N-WFGWX-YVC9B-4J6C9-T83GX"2⤵PID:22372
-
-
C:\Windows\System32\cmd.execmd /c exit /b 02⤵PID:21936
-
-
C:\Windows\System32\wbem\WMIC.exewmic path SoftwareLicensingService where __CLASS='SoftwareLicensingService' call RefreshLicenseStatus2⤵PID:21876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and Description like '%KMSCLIENT%' and PartialProductKey is not NULL) get ID /VALUE" 2>nul2⤵PID:22816
-
C:\Windows\System32\wbem\WMIC.exewmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and Description like '%KMSCLIENT%' and PartialProductKey is not NULL) get ID /VALUE3⤵PID:23108
-
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f" /f2⤵PID:23040
-
-
C:\Windows\System32\reg.exereg delete "HKU\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f" /f2⤵PID:23132
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f"2⤵PID:22300
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588" /f /v KeyManagementServiceName /t REG_SZ /d "127.0.0.2"2⤵PID:22356
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588" /f /v KeyManagementServicePort /t REG_SZ /d "1688"2⤵PID:22272
-
-
C:\Windows\System32\net.exenet stop sppsvc /y2⤵PID:22944
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sppsvc /y3⤵PID:23080
-
-
-
C:\Windows\System32\net.exenet stop sppsvc /y2⤵PID:23044
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sppsvc /y3⤵PID:23116
-
-
-
C:\Windows\System32\net.exenet stop sppsvc /y2⤵PID:23312
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sppsvc /y3⤵PID:23304
-
-
-
C:\Windows\System32\sc.exesc query sppsvc2⤵
- Launches sc.exe
PID:23276
-
-
C:\Windows\System32\find.exefind /i "1 STOPPED"2⤵PID:21912
-
-
C:\Windows\System32\net.exenet stop ClipSVC /y2⤵PID:4600
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ClipSVC /y3⤵PID:4344
-
-
-
C:\Windows\System32\net.exenet start ClipSVC /y2⤵PID:23260
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start ClipSVC /y3⤵PID:23300
-
-
-
C:\Windows\System32\ClipUp.execlipup -v -o2⤵PID:5784
-
C:\Windows\System32\clipup.execlipup -v -o -ppl C:\Users\Admin\AppData\Local\Temp\tem7138.tmp3⤵
- Checks SCSI registry key(s)
PID:21576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe $AssemblyBuilder = [AppDomain]::CurrentDomain.DefineDynamicAssembly(4, 1); $ModuleBuilder = $AssemblyBuilder.DefineDynamicModule(2, $False); $TypeBuilder = $ModuleBuilder.DefineType(0); $meth = $TypeBuilder.DefinePInvokeMethod('BrandingFormatString', 'winbrand.dll', 'Public, Static', 1, [String], @([String]), 1, 3); $meth.SetImplementationFlags(128); $TypeBuilder.CreateType()::BrandingFormatString('%WINDOWS_LONG%')"2⤵PID:5316
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe $AssemblyBuilder = [AppDomain]::CurrentDomain.DefineDynamicAssembly(4, 1); $ModuleBuilder = $AssemblyBuilder.DefineDynamicModule(2, $False); $TypeBuilder = $ModuleBuilder.DefineType(0); $meth = $TypeBuilder.DefinePInvokeMethod('BrandingFormatString', 'winbrand.dll', 'Public, Static', 1, [String], @([String]), 1, 3); $meth.SetImplementationFlags(128); $TypeBuilder.CreateType()::BrandingFormatString('%WINDOWS_LONG%')3⤵
- Command and Scripting Interpreter: PowerShell
PID:23452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "Windows 10 Pro" "2⤵PID:5724
-
-
C:\Windows\System32\find.exefind /i "Windows"2⤵PID:4976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and Description like '%KMSCLIENT%' and PartialProductKey is not NULL) get GracePeriodRemaining /VALUE" 2>nul2⤵PID:23488
-
C:\Windows\System32\wbem\WMIC.exewmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f' and Description like '%KMSCLIENT%' and PartialProductKey is not NULL) get GracePeriodRemaining /VALUE3⤵PID:5140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe "$([DateTime]::Now.addMinutes(7064054)).ToString('yyyy-MM-dd HH:mm:ss')" 2>nul2⤵PID:6008
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "$([DateTime]::Now.addMinutes(7064054)).ToString('yyyy-MM-dd HH:mm:ss')"3⤵PID:724
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "$f=[io.file]::ReadAllText('C:\Users\Admin\Downloads\MAS_AIO.cmd') -split ':regdel\:.*';& ([ScriptBlock]::Create($f[1])) -protect;"2⤵PID:21520
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f" /f2⤵PID:5428
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f"2⤵PID:5440
-
-
C:\Windows\System32\mode.commode 76, 302⤵PID:4860
-
-
C:\Windows\System32\choice.exechoice /C:12345670 /N2⤵PID:5928
-
-
C:\Windows\system32\Clipup.exe"C:\Windows\system32\Clipup.exe" -o1⤵PID:23480
-
C:\Windows\system32\Clipup.exe"C:\Windows\system32\Clipup.exe" -o -ppl C:\Windows\TEMP\tem6978.tmp2⤵
- Checks SCSI registry key(s)
PID:3264
-
-
C:\Users\Admin\Desktop\SteamtoolsSetup.exe"C:\Users\Admin\Desktop\SteamtoolsSetup.exe"1⤵PID:22900
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
PID:23112
-
-
C:\Windows\system32\pcwrun.exeC:\Windows\system32\pcwrun.exe "C:\Users\Admin\Desktop\SteamtoolsSetup.exe" CompatTab1⤵PID:11656
-
C:\Windows\System32\msdt.exeC:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCW7FE4.xml /skip TRUE2⤵
- Suspicious use of FindShellTrayWindow
PID:11760 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\pcwutl.dll,LaunchApplication "C:\Users\Admin\Desktop\SteamtoolsSetup.exe"3⤵
- Checks computer location settings
PID:19340 -
C:\Users\Admin\Desktop\SteamtoolsSetup.exe"C:\Users\Admin\Desktop\SteamtoolsSetup.exe"4⤵PID:11892
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F5⤵
- Kills process with taskkill
PID:10616
-
-
-
-
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵PID:22548
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0zls5za4\0zls5za4.cmdline"2⤵PID:20664
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8515.tmp" "c:\Users\Admin\AppData\Local\Temp\0zls5za4\CSC9E436AD21CC740E0A057F91A1D5A4E49.TMP"3⤵PID:22576
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4vsr0n51\4vsr0n51.cmdline"2⤵PID:11764
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES85EF.tmp" "c:\Users\Admin\AppData\Local\Temp\4vsr0n51\CSC4701CD1D890245C2B68927468FBE72C.TMP"3⤵PID:10400
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\efnqvtq0\efnqvtq0.cmdline"2⤵PID:22088
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8C48.tmp" "c:\Users\Admin\AppData\Local\Temp\efnqvtq0\CSCCD64A39A239948329B4AA30C332DE56.TMP"3⤵PID:18368
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:18916
-
C:\Program Files (x86)\Steam\Steam.exe"C:\Program Files (x86)\Steam\Steam.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:19872 -
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" "-lang=en_US" "-cachedir=C:\Users\Admin\AppData\Local\Steam\htmlcache" "-steampid=19872" "-buildid=1721173382" "-steamid=0" "-logdir=C:\Program Files (x86)\Steam\logs" "-uimode=7" "-startcount=0" "-userdatadir=C:\Users\Admin\AppData\Local\Steam\cefdata" "-steamuniverse=Public" "-realm=Global" "-clientui=C:\Program Files (x86)\Steam\clientui" "-steampath=C:\Program Files (x86)\Steam\Steam.exe" "-launcher=0" --valve-enable-site-isolation --enable-smooth-scrolling --enable-direct-write "--log-file=C:\Program Files (x86)\Steam\logs\cef_log.txt" --disable-quick-menu "--disable-features=SpareRendererForSitePerProcess,DcheckIsFatal"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:19988 -
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=crashpad-handler /prefetch:7 --max-uploads=5 --max-db-size=20 --max-db-age=5 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files (x86)\Steam\dumps" "--metrics-dir=C:\Users\Admin\AppData\Local\CEF\User Data" --url=https://crash.steampowered.com/submit --annotation=platform=win64 --annotation=product=cefwebhelper --annotation=version=1721173382 --initial-client-data=0x35c,0x360,0x364,0x338,0x368,0x7ffac415ee38,0x7ffac415ee48,0x7ffac415ee583⤵
- Executes dropped EXE
PID:10656
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=gpu-process --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1721173382 --steamid=0 --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Program Files (x86)\Steam\logs\cef_log.txt" --mojo-platform-channel-handle=1596 --field-trial-handle=1728,i,13873679682626179123,3067092522569664345,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:23⤵
- Executes dropped EXE
PID:11344
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1721173382 --steamid=0 --log-file="C:\Program Files (x86)\Steam\logs\cef_log.txt" --mojo-platform-channel-handle=2200 --field-trial-handle=1728,i,13873679682626179123,3067092522569664345,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:83⤵
- Executes dropped EXE
PID:11132
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1721173382 --steamid=0 --log-file="C:\Program Files (x86)\Steam\logs\cef_log.txt" --mojo-platform-channel-handle=2556 --field-trial-handle=1728,i,13873679682626179123,3067092522569664345,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:83⤵
- Executes dropped EXE
PID:12016
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=renderer --user-agent-product="Valve Steam Client" --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1721173382 --steamid=0 --first-renderer-process --log-file="C:\Program Files (x86)\Steam\logs\cef_log.txt" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1728,i,13873679682626179123,3067092522569664345,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:11928
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1721173382 --steamid=0 --log-file="C:\Program Files (x86)\Steam\logs\cef_log.txt" --mojo-platform-channel-handle=3588 --field-trial-handle=1728,i,13873679682626179123,3067092522569664345,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:83⤵
- Executes dropped EXE
PID:17924
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1721173382 --steamid=0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Program Files (x86)\Steam\logs\cef_log.txt" --mojo-platform-channel-handle=3604 --field-trial-handle=1728,i,13873679682626179123,3067092522569664345,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:23⤵
- Executes dropped EXE
PID:15428
-
-
-
C:\Program Files (x86)\Steam\bin\gldriverquery64.exe.\bin\gldriverquery64.exe2⤵
- Executes dropped EXE
PID:5832
-
-
C:\Program Files (x86)\Steam\bin\gldriverquery.exe.\bin\gldriverquery.exe2⤵
- Executes dropped EXE
PID:2120
-
-
C:\Program Files (x86)\Steam\bin\vulkandriverquery64.exe.\bin\vulkandriverquery64.exe2⤵
- Executes dropped EXE
PID:6156
-
-
C:\Program Files (x86)\Steam\bin\vulkandriverquery.exe.\bin\vulkandriverquery.exe2⤵
- Executes dropped EXE
PID:6448
-
-
C:\Program Files (x86)\Steam\steamerrorreporter.exeC:\Program Files (x86)\Steam\steam2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5660
-
-
C:\Program Files (x86)\Steam\steamerrorreporter.exeC:\Program Files (x86)\Steam\steam2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:21844
-
-
C:\Program Files (x86)\Steam\steamerrorreporter.exeC:\Program Files (x86)\Steam\steam2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:22708
-
-
C:\Users\Admin\Desktop\SteamtoolsSetup.exe"C:\Users\Admin\Desktop\SteamtoolsSetup.exe"1⤵PID:6652
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
PID:6824
-
-
C:\Users\Admin\Desktop\SteamtoolsSetup.exe"C:\Users\Admin\Desktop\SteamtoolsSetup.exe"1⤵PID:14532
-
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F2⤵
- Kills process with taskkill
PID:14452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaulta45bb341h3affh4fa8h9570hffc8b61aa0c01⤵PID:12716
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:12764
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:13904
-
C:\Windows\System32\3uu4gi.exe"C:\Windows\System32\3uu4gi.exe"1⤵PID:8692
-
C:\Windows\System32\3uu4gi.exe"C:\Windows\System32\3uu4gi.exe"1⤵PID:8600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.bing.com/search?q=3uu4gi.exe 3uu4gi.exe"1⤵PID:3840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --field-trial-handle=5036,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5080 /prefetch:11⤵PID:5460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=5048,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5088 /prefetch:11⤵PID:5532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5292,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5284 /prefetch:81⤵PID:8476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5320,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5364 /prefetch:81⤵PID:8480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=5728,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5704 /prefetch:81⤵PID:8220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=5932,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5944 /prefetch:11⤵PID:5548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --field-trial-handle=6072,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=5076 /prefetch:81⤵PID:7556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --field-trial-handle=5056,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=6132 /prefetch:81⤵
- Modifies registry class
PID:7600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --field-trial-handle=5112,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=6184 /prefetch:11⤵PID:7320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:7020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x238,0x23c,0x240,0x234,0x254,0x7ffac0a4d198,0x7ffac0a4d1a4,0x7ffac0a4d1b02⤵PID:6988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2300,i,462576115513697233,5860880801009541173,262144 --variations-seed-version --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:9984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1876,i,462576115513697233,5860880801009541173,262144 --variations-seed-version --mojo-platform-channel-handle=2332 /prefetch:32⤵PID:9992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2440,i,462576115513697233,5860880801009541173,262144 --variations-seed-version --mojo-platform-channel-handle=2456 /prefetch:82⤵PID:7076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4464,i,462576115513697233,5860880801009541173,262144 --variations-seed-version --mojo-platform-channel-handle=4492 /prefetch:82⤵PID:7396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4464,i,462576115513697233,5860880801009541173,262144 --variations-seed-version --mojo-platform-channel-handle=4492 /prefetch:82⤵PID:8204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=560,i,462576115513697233,5860880801009541173,262144 --variations-seed-version --mojo-platform-channel-handle=4372 /prefetch:82⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4496,i,462576115513697233,5860880801009541173,262144 --variations-seed-version --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=3464,i,462576115513697233,5860880801009541173,262144 --variations-seed-version --mojo-platform-channel-handle=3356 /prefetch:82⤵PID:11184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4900,i,462576115513697233,5860880801009541173,262144 --variations-seed-version --mojo-platform-channel-handle=4580 /prefetch:82⤵PID:15972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --field-trial-handle=1308,i,462576115513697233,5860880801009541173,262144 --variations-seed-version --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:20496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe"1⤵PID:7352
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:9376
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:1368 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1956 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 24856 -prefMapSize 245077 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58268176-eade-4de4-96c7-f8e89d07ab6a} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" gpu3⤵PID:2324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2316 -parentBuildID 20240401114208 -prefsHandle 2308 -prefMapHandle 2304 -prefsLen 24856 -prefMapSize 245077 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bf0182e-6037-40dd-9432-0e04ea9c1a0a} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" socket3⤵
- Checks processor information in registry
PID:14876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3064 -childID 1 -isForBrowser -prefsHandle 3164 -prefMapHandle 3160 -prefsLen 25355 -prefMapSize 245077 -jsInitHandle 1388 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6469c71c-d635-4c9b-b86a-b45eb24089b6} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" tab3⤵PID:9324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3560 -childID 2 -isForBrowser -prefsHandle 3044 -prefMapHandle 2860 -prefsLen 30588 -prefMapSize 245077 -jsInitHandle 1388 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {345a7bd4-f4fe-45ca-ae00-4415e1ffdcb1} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" tab3⤵PID:6048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4452 -childID 3 -isForBrowser -prefsHandle 4444 -prefMapHandle 4440 -prefsLen 27920 -prefMapSize 245077 -jsInitHandle 1388 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e685e065-e70a-489c-9327-126b4abbf1ea} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" tab3⤵PID:16388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4864 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4980 -prefMapHandle 5004 -prefsLen 30588 -prefMapSize 245077 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ea971ef-60a3-40ab-912e-40871fd617b4} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" utility3⤵
- Checks processor information in registry
PID:6720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5488 -childID 4 -isForBrowser -prefsHandle 5468 -prefMapHandle 5472 -prefsLen 27920 -prefMapSize 245077 -jsInitHandle 1388 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {09b1ef24-54c2-4735-8c9f-627f189badb5} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" tab3⤵PID:9504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5644 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5508 -prefsLen 27920 -prefMapSize 245077 -jsInitHandle 1388 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c4dbe02-1b9e-49c0-aceb-c7eb05190a54} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" tab3⤵PID:17124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5808 -childID 6 -isForBrowser -prefsHandle 5816 -prefMapHandle 5820 -prefsLen 27920 -prefMapSize 245077 -jsInitHandle 1388 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bb2759b2-6dd1-4b38-8bf3-74d6797a78fd} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" tab3⤵PID:16844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4464 -childID 7 -isForBrowser -prefsHandle 4472 -prefMapHandle 4452 -prefsLen 27920 -prefMapSize 245077 -jsInitHandle 1388 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06480d7d-55f4-4f22-a1f8-d539b9447320} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" tab3⤵PID:17164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5572 -childID 8 -isForBrowser -prefsHandle 5504 -prefMapHandle 5584 -prefsLen 28027 -prefMapSize 245077 -jsInitHandle 1388 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79171039-1c02-4057-8bf2-e1074f6d0452} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" tab3⤵PID:19796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3960 -parentBuildID 20240401114208 -prefsHandle 4764 -prefMapHandle 4772 -prefsLen 30695 -prefMapSize 245077 -appDir "C:\Program Files\Mozilla Firefox\browser" - {82b363a4-6a45-4aee-bfd9-d484025fbe16} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" rdd3⤵PID:17524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 3964 -prefMapHandle 3956 -prefsLen 30695 -prefMapSize 245077 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd3a949b-54ca-48fd-96d2-a677fd19828d} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" utility3⤵
- Checks processor information in registry
PID:17224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6552 -childID 9 -isForBrowser -prefsHandle 6440 -prefMapHandle 6536 -prefsLen 28027 -prefMapSize 245077 -jsInitHandle 1388 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa6446d1-0826-4fc7-bc65-8cd73565e4db} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" tab3⤵PID:17004
-
-
C:\Users\Admin\Downloads\SteamtoolsSetup.exe"C:\Users\Admin\Downloads\SteamtoolsSetup.exe"3⤵
- Executes dropped EXE
PID:20036 -
C:\Windows\system32\taskkill.exe"taskkill" /IM Steamtools.exe /F4⤵
- Kills process with taskkill
PID:2044
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaulte132c746h0557h4ad9h954fh3ec29c5365b51⤵PID:21716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:6024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultd227396dh907eh4da0ha70fh0ab163b45a0b1⤵PID:5384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultaae576c3hfbc0h4d44ha379hc25615be53821⤵PID:5272
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD533bcb1c8975a4063a134a72803e0ca16
SHA1ed7a4e6e66511bb8b3e32cbfb5557ebcb4082b65
SHA25612222b0908eb69581985f7e04aa6240e928fb08aa5a3ec36acae3440633c9eb1
SHA51213f3a7d6215bb4837ea0a1a9c5ba06a985e0c80979c25cfb526a390d71a15d1737c0290a899f4705c2749982c9f6c9007c1751fef1a97b12db529b2f33c97b49
-
Filesize
7.1MB
MD5d764264518e77cc546a5876c3bcebad4
SHA1ea17d45b396fa193a851bfd345e2b2c20ad60e12
SHA256e78492de0ab575add50b925bfd44216d224d09904a9b14c17087a92fdcbc15cd
SHA5127cf132ea5254a55c08186ffcf5e47360ef5ddd57d03d7051171f6753b22e3925304d183c2037bfd320ad56c08e079f9b2c4640db8cb3dbd38ff500c7a39e997f
-
Filesize
226KB
MD5a09c5fa842fa4456a0b53b46f1050225
SHA19e4677f19e77bf55e7d0e2e82d8c27f79dbbd78e
SHA2563d7ba6fedfdfd6e751693d718a21438304690b754d1c5d13c847a829b2423b8b
SHA51271c962da6ed6894209891513bf9f0132a5eab6c65a5d9ba334efcaf73463be5625665a060863a106d59fad1949f6191f641aa4c59ddb0e825701bef08ef9b5a5
-
Filesize
2.5MB
MD5ba0ea9249da4ab8f62432617489ae5a6
SHA1d8873c5dcb6e128c39cf0c423b502821343659a7
SHA256ce177dc8cf42513ff819c7b8597c7be290f9e98632a34ecd868dc76003421f0d
SHA51252958d55b03e1ddc69afc2f1a02f7813199e4b3bf114514c438ab4d10d5ca83b865ba6090550951c0a43b666c6728304009572212444a27a3f5184663f4b0b8b
-
Filesize
177KB
MD5c3f779618f359161cb4584d8b4f76c96
SHA1ed20aefa670c8a9a01b2e5648228e1d38a2f7a99
SHA25606b721c371debecc442b7d03774f99935f46b261311bb1ab110bfe8b0a48a516
SHA5127aaeef7574def8c27e3b63d07dd9db09619ff047de47253d1035764c80fd6000ad6718cf60e5e2e3a6b4bdeefc407bb5a43961ce03ba512b271c326a5cc307b5
-
Filesize
23KB
MD54cbad862a3ff6e7ac0f33a904d247536
SHA157ed831d8f3739aee41735fce679641862c36076
SHA25632a70082cf3496745580c0e4b7d1bdbe925013300f0573ccef466e7a1915a51c
SHA512355e5f5081588c2460b6c21818172eea17b18f6d94a958902db57a585409c8a2231a2666bc12548316a041bfce8a2eeeef2e4759a9e38900550b6a7c96d7ed2a
-
Filesize
23KB
MD5f9bf7d30ea5a945b77910a06151ff620
SHA13158c9ab3fd9b6fed40e77abe39eb53234151977
SHA256b4ff5467266a4f8e5d8998525a8948b8b86d51a23c2f4f7023c505c8db341802
SHA51207e01ebde7c80fa3937f2169da9dc496f0a5efbbbc9c305e7772e28e334906054c14747fe10cca0ac1f1f275d95a08801ae7c44ca1cbddae1c1e008bf428d1a4
-
Filesize
23KB
MD5e763390e8aebf15cb2b9b5b8c9cc4e9e
SHA10f9f6544903700fa26c8892ff7e4881c56238282
SHA2565963b1cdb894ce297e52844741047f74f8d86fa7e97437e26d9bc8f0094e1003
SHA5124c8089029c0d97ef1a1570dc47a8eda08f2071332521cdb54b5b52786d078c19bf0324fa43b9d1c49b942f8eedf7a6dab606b25a3913a80f6c8d7bb97d28a768
-
Filesize
23KB
MD5df9e90a38a99d1f609ba721a3d329195
SHA1ad8859c5ec7f591800c0d4b6453eb10167ae142d
SHA256ba17d3a66e3df85fbf8b82b500f1360f8598cd48a814fda3e552cdd995e6f449
SHA512e41ba10d2c679754627c348232bd8124a01eceedfe30c88b6f7ed257895a7b59e5149d448a68415c4d2cc1a5c2c32a575f032b764a14a2330d62f08ccb87de85
-
Filesize
23KB
MD5649e3b7d4b114213383aebd2dda0308d
SHA1ba1ba5acb362cbab817c5e1a3126d6ebf600740b
SHA256b15dd0c332b261d62a0b37b8981980a15e47b4682e6985e26f155a85f19e1466
SHA512e667462ba457d44982337edda451a5d78eb4b6eab2e6a696ca333bdcd6688873e2c50b45e464e333ecf9f5b07dc35412bc746ff187b99e8139f9b8ef0456849c
-
Filesize
23KB
MD5b72dcda47e269f98aa6998df1b27b3e5
SHA18a68318787497d2ed4ee6d981de825c874bcb603
SHA256b9aefe9709a17fcaf8b85168c68f42e2b57f8214e7456a82c74495b815dc5bfe
SHA51217b00481db67db8bf8f07035c760eb7adff65d59c532711d918bb1f2bbdbb6230cd0c583f3418102b80b6a085d45d3e3efe9a641e7dfa821c8a18505e9bb1420
-
Filesize
27KB
MD5d218fcedc1bee50c45f4e786c6d60564
SHA1c4371579afbfae000e5b9a0ce07472be17badc9f
SHA25613266c9674e9c663252ff2dc1a014a86cbaa42801d210f408269bd1dff681440
SHA512efc30d116515ee000084db671a4c2d68551035b5512e7117c3c53d6ceb2b0418ee2ccdb5f76fa267be48e37d21a950e20423f95fc4e1c4d2c9e5fb47b692c882
-
Filesize
23KB
MD52bfcd1d1b70eef1a10c939a4eeab5403
SHA112656ee086124eaf205a9eb470a78bc5e3d2512e
SHA256b0919c80eb88d5d6aeb7a6eb42344f40ebf6bf0914a45045d9606e2469f15132
SHA5129143ffd7e00f4168f78f72e9e08e6a901ffc57a1bdc07531d73f0d4fc59ae2a114d939bf2a60313ac34aa835e6c297168f255685cbd795c748fe9c8906d2215c
-
Filesize
23KB
MD5b3a3f902a5fe7b70c988aebd0e523d53
SHA16fb07024c76cd0c4e07c3d0efa088b74998d59b1
SHA25661365671b9fccbc10c06ccc0d4c8875dd98ca51e8d3eb77e91069b1bd11e4a96
SHA5123bc057781870932f9703561bed8f786af9306a6a237582551edd12220e95521b8433a507ce702fa929654e930d0cba976eb0fc72fbe567d44620232e18390ce9
-
Filesize
361KB
MD57fd9c99282f84cb7895b1461c5b6c903
SHA13ace763ad9bc84f85825bb96cbba9162c5c28d2c
SHA256c57cdc261c15b4c6872e39b6eecf60a0ef7e09632b7fff34c38c3c7b8f715b19
SHA512832a20949a72d916151ad98539407d2c7e9b15933c01b1b21adf4d14f47464329f07c180d0e1960fb42efab068ad5f310779aaf6cc40bee1c8bcbc32fa981608
-
Filesize
11KB
MD521aa22d45a9db1680ad27c203efbdab5
SHA107bea8451a76235bab0a6f45cca2076b81bbc5b9
SHA2569422135cc4ca716405fae4e2a570055fa228fc6ac36d4a1e735d42c856018d14
SHA512abafc279335346626ed00daba0814e6a00945b06829c845e63152570efcc5842bc7a6f8b9f9ccfcbb5d32a99a9a2fb3cc93beadaec248788a6229ec8952dd5a4
-
Filesize
2KB
MD54fbc1f320970eb619e357df700c24462
SHA1a64c65827e1bc9932806ff25cddd1bc12ca396ba
SHA256254d68dff4fb1faaf9c7432bd72c8f80bdf61881e520560e4d493dccab6d76d9
SHA512a002ce95a238d67d1ff25bf9a71a4b043f23208309001a2c2a40593d7cd3475abb2d28c50cb967d87428711be751cf42366b32946ea9da6f703e415ad6e3b312
-
Filesize
465KB
MD5dd84a6d3a5a13725557fbbf1e8d57d9d
SHA1b9e8d6e4c0715850da90740521a6b2c97df6cec0
SHA25681cc2601fa7230479d5e05f739c5ef5504a23bfb3855d7319965f61139c3221c
SHA512b94d17f84d2a55962f28c833653cb5605d7945fa5cbb3a149273274f61992b31835688ea7e89ecb816f9ec963973e2f22582f6cb9e7fef3021ea67caa1ad6de5
-
Filesize
9KB
MD5628c58048e8d0dfd0d5a985b359b353f
SHA1fa1c6b8addaeca7da658894e64b62252f8aacacb
SHA256290816f20a98ea9b9ab3185c2c59eeb3c4c7b9a861c72d453622e7d1e07653d4
SHA512be287f2c42927f939997b61052e23fb4c13b7709655fc20c34956c5d131d8820cf90aa67139191f801c1ca118ee71a33b74970e263ed87916203fc0f3e6fdb8e
-
C:\Program Files (x86)\Steam\package\tmp\graphics\[email protected]_
Filesize15KB
MD5577b7286c7b05cecde9bea0a0d39740e
SHA1144d97afe83738177a2dbe43994f14ec11e44b53
SHA256983aa3928f15f5154266be7063a75e1fce87238bbe81a910219dea01d5376824
SHA5128cd55264a6e973bb6683c6f376672b74a263b48b087240df8296735fd7ae6274ee688fdb16d7febad14288a866ea47e78b114c357a9b03471b1e72df053ebcb0
-
Filesize
20KB
MD500bf35778a90f9dfa68ce0d1a032d9b5
SHA1de6a3d102de9a186e1585be14b49390dcb9605d6
SHA256cab3a68b64d8bf22c44080f12d7eab5b281102a8761f804224074ab1f6130fe2
SHA512342c9732ef4185dee691c9c8657a56f577f9c90fc43a4330bdc173536750cee1c40af4adac4f47ac5aca6b80ab347ebe2d31d38ea540245b38ab72ee8718a041
-
Filesize
23B
MD5836dd6b25a8902af48cd52738b675e4b
SHA1449347c06a872bedf311046bca8d316bfba3830b
SHA2566feb83ca306745d634903cf09274b7baf0ac38e43c6b3fab1a608be344c3ef64
SHA5126ab1e4a7fa9da6d33cee104344ba2ccb3e85cd2d013ba3e4c6790fd7fd482c85f5f76e9ae38c5190cdbbe246a48dae775501f7414bec4f6682a05685994e6b80
-
Filesize
4KB
MD50340d1a0bbdb8f3017d2326f4e351e0a
SHA190d078e9f732794db5b0ffeb781a1f2ed2966139
SHA2560fcd7ae491b467858f2a8745c5ecdd55451399778c2119517ee686d1f264b544
SHA5129d23e020875ed35825169a6542512ec2ffdb349472a12eb1e59ddc635e57c8fd65fa919873821e35c755aa7d027c9a62d3d0fa617340449d7b2c4cf8dd707e93
-
Filesize
6KB
MD54c81277a127e3d65fb5065f518ffe9c2
SHA1253264b9b56e5bac0714d5be6cade09ae74c2a3a
SHA25676a6bd74194efd819d33802decdfddaae893069d7000e44944dda05022cfa6d9
SHA512be077b61f3b6d56a1f4d24957deaf18d2dff699bda6569604aac4f1edb57c3cfd0abc5e2a67809f72e31a90b4aed0813536c153886da2099376964c60e56001a
-
Filesize
4KB
MD52158881817b9163bf0fd4724d549aed4
SHA1c500f2e8f47a11129114ee4f19524aee8fecc502
SHA256650a265dffdc5dc50200bb82d56f416a3a423eecc08c962cfd1ba2d40a1ff3f7
SHA512f3594aad9d6c50254f690c903f078a5b7a58c33bd418abdad711ebb74cfbdb5564679593e08fb2d4378faaf4160d45e3d276ba1aa8a174ed77a5791bcac46f28
-
Filesize
4KB
MD503b664bd98485425c21cdf83bc358703
SHA10a31dcfeb1957e0b00b87c2305400d004a9a5bdb
SHA256fdf7b42b3b027a12e1b79cb10ab9e6e34c668b04eb9e8a907d8611ba46473115
SHA5124a8cdd4b98432ba9d9b36bc64aab9a2eab31a074d1cbdfab3d35a14216c60752b5580c41bbb70104993420043685d3bd47eb6637b8fcbb3f42f76a15e4be041d
-
Filesize
4KB
MD531a29061e51e245f74bb26d103c666ad
SHA1271e26240db3ba0dcffc10866ccfcfa1c33cf1cc
SHA25656c8a86fa95eab0d8f34f498e079b5516b96d2a2f1ad9c2a888555e50e47f192
SHA512f85865c1e9ab45e5586d3dd2b45d15265193e8a3c34b6bb1ac7e415a1ea878cfb044e8e01012e917e4f00bb9e0a422f56253f328df1bac99a145e19433354cf8
-
Filesize
4KB
MD5da6cd2483ad8a21e8356e63d036df55b
SHA10e808a400facec559e6fbab960a7bdfaab4c6b04
SHA256ebececd3f691ac20e5b73e5c81861a01531203df3cf2baa9e1b6d004733a42a6
SHA51206145861eb4803c9813a88cd715769a4baa0bab0e87b28f59aa242d4369817789f4c85114e8d0ceb502e080ec3ec03400385924ec7537e7b04f724ba7f17b925
-
Filesize
4KB
MD59e62fc923c65bfc3f40aaf6ec4fd1010
SHA18f76faff18bd64696683c2a7a04d16aac1ef7e61
SHA2568ff0f3cbdf28102ff037b9cda90590e4b66e1e654b90f9aea2cd5364494d02b7
SHA512c8ff15373b37e848e6239a82424569e77c82a5fc557d17e7d2ed1d0d2b2f7d026cc1e2bc98cb5ee945c02cfefb82803c23fa6a26f48ff0adcf762f94cd5dd035
-
Filesize
4KB
MD510c429eb58b4274af6b6ef08f376d46c
SHA1af1e049ddb9f875c609b0f9a38651fc1867b50d3
SHA256a1f6ba57ee41e009d904905c0ce5e75a59ee6790e08542561303109e1faafa13
SHA512d8760f61760bffd8671b727d386ae220e7e6e68829a01553cfd5eb60ef8bd1d7c1b25e7b17a6db5bd17ba6712ef44999726764459318e784843c73bc4facaf46
-
Filesize
4KB
MD55c026fd6072a7c5cf31c75818cddedec
SHA1341aa1df1d034e6f0a7dff88d37c9f11a716cae6
SHA2560828572e4fa00c186dbf1d9072a6154d65cb499c6a37e338f3305f77a2fee382
SHA512f9d28714b2a05f8d9025f1692e4d7e8baa6daf6176353f65646a38814a242ef2adededa44419edd69f10cf96ffba506dab7cb6e52111457bf69cffef12174b12
-
Filesize
6KB
MD5189ba063d1481528cbd6e0c4afc3abaa
SHA140bdd169fcc59928c69eea74fd7e057096b33092
SHA256c0a7a1df442ac080668762df795c72aa322e9d415c41bd0a4c676a4dc0551695
SHA512ce59ad9b17bab4de1254e92ce4fe7d8c8242832f62ab382e8f54199a9932cd11b5800cc33895441426373d5210cc74104e0271b721a7e26ed400b716ae4d5903
-
Filesize
4KB
MD518aaaf5ffcdd21b1b34291e812d83063
SHA1aa9c7ae8d51e947582db493f0fd1d9941880429f
SHA2561f45bb7bdfa01424f9237eec60eba35dc7f0dc4e8c2e193fe768fe96d3ff76d5
SHA5124f3e56d1abe26b56d3f805dc85baaca450c0c7bec57ebcf8a6bb6ebb8588307dad130c83bf792bac76694909a14fd6a4d7d1e9b31e32fba11256343b9fc18154
-
Filesize
4KB
MD51514d082b672b372cdfb8dd85c3437f1
SHA1336a01192edb76ae6501d6974b3b6f0c05ea223a
SHA2563b3c5c615fd82070cc951ab482d3de8cb12df0b3df59fbd11f9d3271fa2fbca4
SHA5124d41c945ce7c94746875b0dbceb14811d4966de4e97fe047406a304162fde7e1e2a16367fc2e43978e2e5aa66749f036b4444aa2312673c2cc3af296e8b77f55
-
Filesize
4KB
MD58958371646901eac40807eeb2f346382
SHA155fb07b48a3e354f7556d7edb75144635a850903
SHA256b01ec64d75fd1fbd00fbeb45a3fb39244911a8b22bb43de4e0c03f205184f585
SHA51214c5dbb017822336f22bf6779ccd4a66604ddc5f2c3caa24271e96f739fef007754d96844efa422d6682cbcd2d3bc902c36f0f6acb3eb87ed8d7b3f885973554
-
Filesize
5KB
MD57e1d15fc9ba66a868c5c6cb1c2822f83
SHA1bfe9a25fdc8721d7b76cecb9527a9ba7823dc3d7
SHA256fc74e26a8baabbe4851109512d85173b75dbf7293d41eb3b92a1957a773c8265
SHA5120892be14a858cc860766afb1c996b2c355108a7e50971ea3ec00d15069e919a6eb05a61fa839bea3938492c391e274144c5e248f4c204a602bf36adf27e5b406
-
Filesize
4KB
MD5202b825d0ef72096b82db255c4e747fa
SHA13a3265e5bbaa1d1b774195a3858f29cea75c9e75
SHA2563d1399f5323a3ece1b1a8b3b31f8fd7f50c3bd319ab3f1c38c6e347452c95314
SHA512e8fc7cc09f431301d22a07b238179ee053505090e3c4db30ead061513fe7159f1fe8b80efc93f4597fe00f01087bbe0bb2231e13693d72c8def138657cb91566
-
Filesize
4KB
MD57913f3f33839e3af9e10455df69866c2
SHA115fa957d0a6a2717027f5b35f4dbe5e0ab8ece25
SHA25605bc1f4973c6d36002ac1b37ce46b1f941fcb4338282e0ec1ec83fb558d1a88c
SHA512534e541757d19ee157a268bf7ea358b48015f400542fcfa49cdb547cd652926160f015fe2cf026d9c4996e56ab90ca3899dfd457997d915bf6bc9d7bb00ba804
-
Filesize
4KB
MD558e0fcbee3cca4ef61b97928cfe89535
SHA11297e3af3ca9e4fe3cc5db78ebbfa642e8a2c57b
SHA256c084a68b65d507eb831831aa2ab9afb9536cb99a840d248cc155ff87fad18425
SHA51299aff0c481e34cd0e4fcbb2af471afb56d91aa11be664462b08e17ae169ca03ef77e7063b4ecd0f38ca7b2f6dc0bf2e316c7b31dffbbcfc763cd8fae27dc78d2
-
Filesize
4KB
MD59b0b0e82f753cc115d87c7199885ad1b
SHA15743a4ab58684c1f154f84895d87f000b4e98021
SHA2560bdeee9fa28d54d384e06ea646fbcfe3f06698a31dfdc1a50703ffe83ad78d32
SHA512b7780b82fbe705bc8e5a527c011eb685c99ef0b2eb810617b9f82b891341af95ef1c2f46dce9e458c0c4dcc3e7a0d21db6c77f03419cd1c4b521a9b72f9017df
-
Filesize
4KB
MD5eb8926608c5933f05a3f0090e551b15d
SHA1a1012904d440c0e74dad336eac8793ac110f78f8
SHA2562ed2b0d654d60e0a82b0968a91d568b775144e9d92f2b077b6da75f85ad12d04
SHA5129113c42c38836f71ff0cc7019aff8c873845f47fbf1ab97e981cb038f4d8495b6df784402b1ee9666e8e567ae866b0284c81e6a16efb47131d5ef88569c4843a
-
Filesize
4KB
MD56367f43ea3780c4ee166454f5936b1a8
SHA1027a2c24c8320458c49cd78053f586cb4d94ee6f
SHA256f8d1972e75a320344e3c834ba0a3a6a86edb39e20ef706bda9b7965d440d1998
SHA51231aab33e0d272cb43a8c160b3d37256716a683e5052192fd0e4d3cdaf30a10a9afa9d26d5d14ad216ee455627c32892a711d2bc137ee7a7df9a297f001a19e32
-
Filesize
6KB
MD5e04ad6c236b6c61fc53e2cb57ced87e8
SHA1e9d4846b7e6cc755ee14a5d3fa45ee7d3bf425a4
SHA25608c775efa77c2a92d369f794882e467b6e2526e61bc7aa7724f48e174524502e
SHA5120dfb7e6d811d649103499018f3d115c542fcaba420ceb69124a4d837fe162ce514e7be2040860c5ef5f9c01c961fa6eea8730606b73ec107d87597989b6fd331
-
Filesize
4KB
MD556dcf7b68f70826262a6ffaffe6b1c49
SHA112e4272ba0e4eabc610670cdc6941f942da1eb6a
SHA256948cad1bb27109e008f2457248880c759d3fa98b92c5b4033b94f455cb8ac43f
SHA512c3fd9caf0bd4c303a7cc300faada9cfe6dd752e82d67625b31f4c0c2c091596508bb477fe19f758fdf79b25b8ac3f5320a8785d2b6705b9bcc28a054a59454e2
-
Filesize
4KB
MD566456d2b1085446a9f2dbd9e4632754b
SHA18da6248b57e5c2970d853b8d21373772a34b1c28
SHA256c4f821a4903c4e7faea2931c7fb1cf261eba06a9840c78fdca689f5c784c06c4
SHA512196c2282ba13715709ece706c9219fe70c05dd295840082e7d901b9e5592e74b1bb556782181cdbe35bd1ab0d6197fef67258b09491fabc6f27606dbed667d49
-
Filesize
4KB
MD5b2248784049e1af0c690be2af13a4ef3
SHA1aec7461fa46b7f6d00ff308aa9d19c39b934c595
SHA2564bf6b25bf5b18e13b04db6ed2e5ed635eb844fc52baa892f530194d9471f5690
SHA512f5cee6bba20a4d05473971f7f87a36990e88a44b2855c7655b77f48f223219978d91bcd02d320c7e6c2ec368234e1d0201be85b5626ef4909e047e416e1a066c
-
Filesize
4KB
MD5194a73f900a3283da4caa6c09fefcb08
SHA1a7a8005ca77b9f5d9791cb66fcdf6579763b2abb
SHA2565e4f2de5ee98d5d76f5d76fb925417d6668fba08e89f7240f923f3378e3e66f6
SHA51225842535c165d48f4cf4fa7fd06818ec5585cc3719eff933f5776a842713d7adb5667c3b9b1a122a1152450e797535fc7a8e97ebdd31c14b4d4900a33ede01f3
-
Filesize
7KB
MD553f7e8ac1affb04bf132c2ca818eb01e
SHA1bffc3e111761e4dc514c6398a07ffce8555697f6
SHA256488294b7faff720dc3ab5a72e0607761484c678b96d6bcd6aad9ee2388356a83
SHA512c2e79c2505a6fd075df113ffce92ad42c146424ca39087601daa4ed15a2b5528d478a093921d9d8a738c7b6b963275a0693ebe526b6e2135d14ced03639d0e70
-
Filesize
4KB
MD529f9a5ab4adfae371bf980b82de2cb57
SHA16f7ef52a09b99868dd7230f513630ffe473eddf8
SHA256711675edb20b3cb70acf6cf75f2eea8e0d87c8ace3e11c8df362b4517427a34f
SHA512543fe63f791250e05e8fda24fd2ceadebb4c8925e8927de49ae490895c87eed3e61a9ad50237532649f99fe3165836261de215ee3f66ffbfc6d677ddeea7732a
-
Filesize
6KB
MD5cadd7a2f359b22580bdd6281ea23744d
SHA1e82e790a7561d0908aee8e3b1af97823e147f88b
SHA2563dd0edfbe68236e668fb308f92fe7c6493dbb05bfca85a48de93588f479ccc99
SHA51253672dd13e6ccbe96f6d4a61297c595b6d6cba8de92caa51ccf8ab1d8a82eea5a425eab348f295b9ec27de0026ef849d9230f751a46e040be8863923f91b8519
-
Filesize
4KB
MD5f350c8747d77777f456037184af9212c
SHA1753d8c260b852a299df76c4f215b0d2215f6a723
SHA25615b6a564e05857a3d2fd6eec85a5a30c491a7553d15ffc025156b3665b919185
SHA512efb86809a0b357b4fcd3ba2770c97d225d0f4d9fb7430c515e847c3dd77ee109def4bef11b650b9773c17050e618008fc03377638c1db3393ac780b5b0bc31b2
-
Filesize
4.2MB
MD5ea6ae07191d791da1243a8c84e45b484
SHA1b09c09f5ef38e2c95b91edf42ece680bd6246798
SHA2564cf97f554b7c2bb90aecbfffbb2168804784b1a65ec357503a1bb7e450d31207
SHA5126d779d0d4e5cbdf4cad14d048aabf79be7bbf13b20e244f96565ae444ad3433cfe1aa89fb8b4e86bc8a98689d24549c44d3156ac1a1409b8c052d1d977813462
-
Filesize
473B
MD5f6719687bed7403612eaed0b191eb4a9
SHA1dd03919750e45507743bd089a659e8efcefa7af1
SHA256afb514e4269594234b32c873ba2cd3cc8892e836861137b531a40a1232820c59
SHA512dd14a7eae05d90f35a055a5098d09cd2233d784f6ac228b5927925241689bff828e573b7a90a5196bfdd7aaeecf00f5c94486ad9e3910cfb07475fcfbb7f0d56
-
C:\Program Files\chrome_ComponentUnpacker_BeginUnzipping19988_354887355\_platform_specific\win_x64\widevinecdm.dll.sig
Filesize1KB
MD536e5ee071a6f2f03c5d3889de80b0f0d
SHA1cf6e8ddb87660ef1ef84ae36f97548a2351ac604
SHA2566be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683
SHA51299b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e
-
Filesize
1001B
MD52648d437c53db54b3ebd00e64852687e
SHA166cfe157f4c8e17bfda15325abfef40ec6d49608
SHA25668a3d7cb10f3001f40bc583b7fff0183895a61d3bd1b7a1c34e602df6f0f8806
SHA51286d5c3129bec156b17b8ebd5dec5a6258e10cb426b84dd3e4af85c9c2cd7ebf4faea01fd10dd906a18ea1042394c3f41a835eae2d83dc8146dfe4b6d71147828
-
Filesize
899B
MD5923ce4120dffd5255bfccd38b53d9403
SHA149a6ee78cc1616864e2e35b76396add0452ee09c
SHA256f7a53c5a32dd9fbd55a36bdb756f33ecf0f42f25eca8b6fafabd1fc516659e24
SHA5125338a2425a753c1438447c1715443d3be21013e0a665a5b1c0ac1f1ecf474368bff9ad131ac7e8f94b4a75cfaa74fb976661d90181ca6ada109492efefdc1568
-
Filesize
3KB
MD509a981e5c6581544cfc62abcf9bd31a6
SHA170dc1d3c4ec2de92730c7e18e1de571a86b4fd41
SHA25602174ecdbfc746b3e10528d12d36b834c95c2b785e9c20acaace04f0f1ee444f
SHA51294d2445d50066b88c9b5b4b79f5ddf936b4a284aea8b287e5d978b6c6cf291450a613784cb8af0b03935e6cf7768801f1084759592381bb6a1cd1ab9e4ca49f4
-
Filesize
1KB
MD5df015d13ff249250cd4dc8d50597fa68
SHA19b0824a3885e494160eab6f1fc5731e8b1acd524
SHA2560f48669573b99cbba879e60a6b623096bda6d732cc2798bb0da215fa113b3645
SHA5125fd88c0ff26157acda431371654a13176a20d140b6d49ae7e4acb5a3a6960d17755ee303a3c9724d76a93330f539de2f92436e1cf75c1884f2788fa0f537ec4b
-
Filesize
47KB
MD5310e1da2344ba6ca96666fb639840ea9
SHA1e8694edf9ee68782aa1de05470b884cc1a0e1ded
SHA25667401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
SHA51262ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244
-
Filesize
61KB
MD51d6ad3010a051369a7f8bef116cd83db
SHA1770be099f82eaa949b90da24427e556df68f9a77
SHA2563e4db02f8b19be9f17b2f0c23929074ca4e93b0e873ed69050cfc210403f96d6
SHA512ba9526a5d98bbbdd8727c682721a6c684d44a98d9d3407c8e7433e9d51dcd977478fab77c6e9e46962be2834a118285c8314822d497a30159c296ed868111482
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2KB
MD56e37139c58818bf67b4c4cad63ee2b87
SHA1bda56853883eabc1c9e8ddd00ea6fc50fb072968
SHA2563ddccdc947cfba037028f56764143248edb38e088c66d5a12780628ae07fb626
SHA512a352f385f98143911918ae57b739be128413bbeb05ce7a075a495b2d913c283e07b5c471bd4c85f9774d135144e7ab888c1317958f31bcb22e82ddb3840e8490
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
211B
MD51f053b1158b0107d8d480cf881159867
SHA1cc56aaf3e3e39e0afd886a22ce7021aa1bec3040
SHA256b4849222ecf7bac2da445e1922f54455a9e5bf1912e3458362e12161f98f88ba
SHA512a1cb069325b6b2602e1a2d0ccbba04a5fd1381702b5c987474c32209d52dd5133fbf360332c297727336c81f64d07b254f91d646f2529c164e6221f6642e53f3
-
Filesize
11KB
MD5ebd195389a678f68a717c7b679f75829
SHA16ea92514651171f563a8e26d6272406f8064acbb
SHA25652cd95f235249bb11c01498c8d641a9e09d5f2473afd01839c9282dfd3cc332a
SHA51293aa640954629fa37d73eedbac456b01e602059a90f58d97984dfde046292c34ba7083712a4b24e95385a79eef2bf57739b653cbc12547c8543c145c42688865
-
Filesize
65KB
MD5db38b2eed4e215e0c07e308c061e3b7a
SHA1606e4140f719dbee34702f53d1a6eee274231162
SHA2561876e08e584b271ecc2e989f34d1c16e717591b1c66c0b8f88bf9c4ee2fdef86
SHA51264eecb7708cf553ba583e076191fa86cd691b7378265d71d07d2216f453d401120620b6cd62dbdcb3af5c531298efe50585d6b54df745e773062e724b7cbeebc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\activity-stream.discovery_stream.json
Filesize42KB
MD560b1840f1cca71561d363cced73efa76
SHA1c9d7bd606b7e8b5c6842e285d9d9ffd64e5159a4
SHA256e9349c6e05bd749efa7fa812a5101d837c8f6fcf4a3c3048a778b0baad5147a9
SHA5120ea7b97a1ae88756fc9f137eabd30862fb8afa7ad55fd5b05b1abf6d84c517ffb3767d484e8625b443c1a120c27c689dcffc37fc480a3656b593be887a5b2250
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\activity-stream.discovery_stream.json
Filesize39KB
MD56b41d6f5683641c942c01b4fd4801fc2
SHA1d99f2b6c41e983243930318f80fec4ed09b805f9
SHA256d642591aecfe9098d5eb61efdeb5d8e9425de231a3f1c045766ba5509adf40c9
SHA51215a062c7cc66d411bffc284edee03cd89e13bfb5504881081443d86b3a4a4189abcfdb175dd3fc84581131e28b028cf9e3fe8102fad7b0512e762e9340246b32
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\cache2\entries\57275FAB0C9070930D4C15E4C4EC124CDF071A99
Filesize16KB
MD5d9fe4cb30372bf75780bf9998d863018
SHA16207d3cce7b695a40a3b767b5272ccc03fffb684
SHA25624786f47aadac753b24481ced59634a9379f555c41e4c7925a96303ab3f3de5b
SHA512990b8f5f88a80ce7e3677dabd808db824f351b41ecc194bdac12ddd2e5cfc221f1405f17708731c6fbafbdbfc54d3d9f67a701002402ad255411670297537ab7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\cache2\entries\8D8B638EB9673AC854810F35B1BA010AB9CE957A
Filesize35KB
MD513e46c8d0a7c884af22e90273cf79dbd
SHA135950cdbe5e8dbaa95515994c864755a2c8e2cb3
SHA256cb91cddf58d30d4c619a14590505bf9b2f7a0e37ae2f9debbaec86d119f10434
SHA512b3d1202d5400144aea452da492a9efa617b2ea18cee53fb4a7ef0c235fb6fd780995e1fcca348ef7c76eccd94c76402ff520d5f206bd591d465e08aacffa245e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize7KB
MD5c460716b62456449360b23cf5663f275
SHA106573a83d88286153066bae7062cc9300e567d92
SHA2560ec0f16f92d876a9c1140d4c11e2b346a9292984d9a854360e54e99fdcd99cc0
SHA512476bc3a333aace4c75d9a971ef202d5889561e10d237792ca89f8d379280262ce98cf3d4728460696f8d7ff429a508237764bf4a9ccb59fd615aee07bdcadf30
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD5ec37cfa8c88eae46e358c9320e433d94
SHA16b1f630a132e1932a57f8f2c7b0281118e45e8a0
SHA256ad2b5e99765d39adc47ea6ed904753a4aad3f321de5346fa35f409e008803e46
SHA5127cba90e7a1eba570cf67a1819ef9102ff81c45287ed237d52a2bf426283cc108fef066eb9140f4fc644d80a18455bb4c6db869edcaab957498ce7a98cc40dcc3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\thumbnails\196fa58656f524a66150ebbba832f78e.png
Filesize1KB
MD5a4e3dec615867334fc01bb2b71796edb
SHA16ca3970f02d7ab704f5b82849c2f9163a9bdb9e1
SHA2565fa0608bb3291da5006676cc5880c90c3d591c29e0f96ffad8a35cc961522560
SHA512ff4192657fc611ae0938c3962a541eac877a66d372924a8df62aa8e99f6be4431c6b706df232aff96269746a448fa8a23e7d1c8a9d809d74782baa78a0af62e7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\thumbnails\ed53caf86590c90709c915abb9a23292.png
Filesize78KB
MD5d7ba69c5686144726d9e2c102c61d82e
SHA1e5ac637f2b52f292edb9a0659813541a5687454f
SHA2569fc33183cca73ccbd38585b74d676fcf97581854156e56d17b5bac24f2b14a03
SHA5129a8c8556a03d1b7a7992617ac8ca4a4057112a1c310e48584dc31d1ed582ecd410087e65a6dfda5df2fb18c800efc26b1b083eb067fb31d2e0cdad30a6b2e3a5
-
Filesize
1KB
MD55f58dd2804f2714aef12e177f9e1afd9
SHA1a36b89d5237b65a51af2c5f0a277d024cc8e14ff
SHA2565994d2e9345d124bbf74665f52967bdf563916e745ae4f7421eb3389836ca34d
SHA51291aaf18c38909ae0b53d464c93f6b29e28243bedb86572b020a229d697cb9be79781b5100865187aafcce659b805d893e2946a1aed1f70a92c44d939a7be530a
-
Filesize
240B
MD5d0f493ef17ef6cb1604eef46de354f2d
SHA1b7692285f9a7e6907bf9cc7b6475865f48400aa8
SHA256726e498d25b71065bd840063549fbf6a83992626498fb97b3117f2c3baf846c1
SHA512d2705bb0269b1b51ebe3111fd6fa2bb82782cc9ace5d4c9f22b1660a2ff8919c115a1b1d632c471a778f1288a1bd2b73ff81806ab41a4f4d563cbae608bc8be3
-
Filesize
240B
MD5ee52a94656b6615eb43fa9b90489c145
SHA1c67023c59262f4125487dec9c88fd4fb03d6c1af
SHA256bf171e880a7a26081d84db077625f2d61eea26467d4471d4795d099608fc8791
SHA5127903336f8e15d2b566ca98e4f3e4f698cddc2a0326abc99b61040e2f67a293bc1212a08cc0470e012a996c9ed4af7a385244b2c16a0495e041308b9ada747899
-
Filesize
48B
MD5758090119c21d24ec0d34744d8f1b4a5
SHA193c88dd46ed2da45fd65dcb263a983bce2a0bc95
SHA256bdf54b26016f8342c7dbc9e24693b178e102f75b527514eaacc34157c9127443
SHA51259a0d884066f96a39093794685c2e05f6783d9406c9c17463d173b84a08cbbfd823b3ced3d2ad240721ba00bc1adf5c7088ddf677680d512e1da557720be6e87
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
693B
MD5b3aa0f60a85e36f84427378bb8193c8f
SHA15da728e6ec2d7e968bec3064ac924480b92ddd2d
SHA256337364e1f8bbda71f6ebfda03e8cf20af4603f9c788ad35c0d28e49875785777
SHA51262929e524351fbf0c82bcf359f4a83748386eac34e48c15fa715bb37b6fd8145676e81dbac91fb33653aedaddcfc553dfa9067409011fd91169aa6263d69b669
-
Filesize
786B
MD5feac42840a9d3897e0f9efd7ee50e11f
SHA19ad71681952b9241cd89e29a49f1a53a94f1b37d
SHA2565c7572fa0332e050c8577482d6f4ffecce2584fc7f4169294957cee2b3908cde
SHA51233d7aabc3a536ec999c73a94b7c05de31452f8f29dcb46fb70cdd3182bf1dcdb846e8a10c126890f6c02cb9078904927fb1a34d54b53baffa06a4c91b1ef8aa5
-
Filesize
300B
MD57f249b52d52fbf98755f158adff4d11b
SHA1e90f1f54716be9cb8bb053bd2fcdf878b1c54846
SHA2562a95045c824c3cb28ff010679157b153e6d2c9a981215ba7d17110c58526bcea
SHA51282b5242c7bb40b29bdde641b1fe9e5e30a6b38f05e158a5c5dfa62a30729881209bd1a8a2278011c229cfa96799ef1abbf91ca9c2e271e5d25bfa8a35d104670
-
Filesize
391B
MD5e8e39040061ffa3a947dfdda70cfc0b9
SHA1b4888a15c2485a5bf1b8f5054479a76495ea8158
SHA256bef83942d3a8b136d8457c811348bd86da48c1509697268038017278e0bd54d7
SHA512231ae8b6e26075711f3520b02a553ed848b26e6c918d2b374a385bedded6c0ac4278e8a5b6d6ee3e5bfafde0f03300e52d88b378509a1ea0d92f9f089863b816
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
203B
MD59eed3c874c004cfb36d47cb25b3be1c4
SHA1db738156376946eb5bb36f46dace06d319e32a75
SHA256d86d4a2395ccae91fb0a122a1547c651ff27dec550210cb6392baebb1065ae22
SHA51242aad30ec6060c88bb9369871781cd4967b36d54076c93aa899782c96de559513ecf9d4e3ae03ea4a18457349163b784851291be45cfbbe45b34ccd4f1e7c385
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
110KB
MD5db11ab4828b429a987e7682e495c1810
SHA129c2c2069c4975c90789dc6d3677b4b650196561
SHA256c602c44a4d4088dbf5a659f36ba1c3a9d81f8367577de0cb940c0b8afee5c376
SHA512460d1ccfc0d7180eae4e6f1a326d175fec78a7d6014447a9a79b6df501fa05cd4bd90f8f7a85b7b6a4610e2fa7059e30ae6e17bc828d370e5750de9b40b9ae88
-
Filesize
22KB
MD5a36fbe922ffac9cd85a845d7a813f391
SHA1f656a613a723cc1b449034d73551b4fcdf0dcf1a
SHA256fa367ae36bfbe7c989c24c7abbb13482fc20bc35e7812dc377aa1c281ee14cc0
SHA5121d1b95a285536ddc2a89a9b3be4bb5151b1d4c018ea8e521de838498f62e8f29bb7b3b0250df73e327e8e65e2c80b4a2d9a781276bf2a51d10e7099bacb2e50b
-
Filesize
150KB
MD53614a4be6b610f1daf6c801574f161fe
SHA16edee98c0084a94caa1fe0124b4c19f42b4e7de6
SHA25616e0edc9f47e6e95a9bcad15adbdc46be774fbcd045dd526fc16fc38fdc8d49b
SHA51206e0eff28dfd9a428b31147b242f989ce3e92474a3f391ba62ac8d0d05f1a48f4cf82fd27171658acbd667eaffb94cb4e1baf17040dc3b6e8b27f39b843ca281
-
Filesize
20KB
MD54e5bc4458afa770636f2806ee0a1e999
SHA176dcc64af867526f776ab9225e7f4fe076487765
SHA25691a484dc79be64dd11bf5acb62c893e57505fcd8809483aa92b04f10d81f9de0
SHA512b6f529073a943bddbcb30a57d62216c78fcc9a09424b51ac0824ebfb9cac6cae4211bda26522d6923bd228f244ed8c41656c38284c71867f65d425727dd70162
-
Filesize
17KB
MD52095af18c696968208315d4328a2b7fe
SHA1b1b0e70c03724b2941e92c5098cc1fc0f2b51568
SHA2563e2399ae5ce16dd69f7e2c71d928cf54a1024afced8155f1fd663a3e123d9226
SHA51260105dfb1cd60b4048bd7b367969f36ed6bd29f92488ba8cfa862e31942fd529cbc58e8b0c738d91d8bef07c5902ce334e36c66eae1bfe104b44a159b5615ae5
-
Filesize
15KB
MD508072dc900ca0626e8c079b2c5bcfcf3
SHA135f2bfa0b1b2a65b9475fb91af31f7b02aee4e37
SHA256bb6ce83ddaad4f530a66a1048fac868dfc3b86f5e7b8e240d84d1633e385aee8
SHA5128981da7f225eb78c414e9fb3c63af0c4daae4a78b4f3033df11cce43c3a22fdbf3853425fe3024f68c73d57ffb128cba4d0db63eda1402212d1c7e0ac022353c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1PPW0QJ7B4FSTF3WL6HZ.temp
Filesize13KB
MD56643014a68dfc902a2f9f5526d5e7229
SHA1d625ea544ab0331a57eb604591759d3a4ed0c902
SHA2561006a0e089aa8775820cf029168ccc7a90bc9f7ac5ff7f178c1faff40033c080
SHA51263ce1bba286a8af4440611a0864040f055a53e9ca7622de0b93335ce3848006e12fd86f6a4c5d9a6a0b24730847c6aa90f407e038dc59022c43f649382f8ef98
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms
Filesize5KB
MD5910a454c340d7a8b00bcea8a38ca7474
SHA199a993b90c30f38d0daf2a10393ff3a2cd0e6b7d
SHA25696c8c52bd64537810aedc78c5e5e73a9f1e0e0fda4f5418f184e6d31dfd3f386
SHA51222f03a393c2ea15f1c76bc19a28907a0e322d1b18fd04d025455ffbf82b3f069035c4329161118d2603e4cf09f7a72eb4445c0d5e37666b21d5bc3db251b2692
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize18KB
MD569390a145b2472a256476f1e37f5cb3c
SHA1b775a6f59ced0a992ccdd9d276d65ba3e5f2a4c5
SHA25675b41ae0272f12a64955574faa047ea1cfd24e1c36432ce419b8bb5fc30ecb3e
SHA51287e4bb81af01855ce538566714367a1348ceb3307c7a17c37c0c4831713fdd1300950b04d2d46e72133c575b31fdcfa731d0048e84b5f91768ca2a6f1f501a30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\AlternateServices.bin
Filesize8KB
MD5487586f0d94bd2d73c556b2f7175ec94
SHA1f6d6365f5f899d2586be7d1945fb070f0be4e336
SHA256b39f8f0b5de12e770354b6cdaaa8f1919b5c91efdb5a3b1102e05f0804e042b8
SHA512c9bf4b6c0b704be48e2a0063602e194fb79410dbd79ee3a9801a683ddf4add3f54366aa3990aed52c4528c18369547f5bcaebb08c5b75f1331ca760177811a92
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\broadcast-listeners.json
Filesize209B
MD597c3738563a9448365a735f5f29ed3d5
SHA115a81433236ca6e6ecc4e1c8d0fdb8523b265c57
SHA25663221253f5c30efa214c2cd2adcf51a9c9f9a2c05f119b00a51c9579825c2c24
SHA512ed98f42d5d02ab53a9e50f80b312bed4b5d05d053bec582cf9d619ef91251e86cf4f4d1123c645500fc1dc4673b49a8b7badd3f3a39f565ac643ca4fd0157ae6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\crashes\store.json.mozlz4
Filesize66B
MD5a6338865eb252d0ef8fcf11fa9af3f0d
SHA1cecdd4c4dcae10c2ffc8eb938121b6231de48cd3
SHA256078648c042b9b08483ce246b7f01371072541a2e90d1beb0c8009a6118cbd965
SHA512d950227ac83f4e8246d73f9f35c19e88ce65d0ca5f1ef8ccbb02ed6efc66b1b7e683e2ba0200279d7ca4b49831fd8c3ceb0584265b10accff2611ec1ca8c0c6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD57a62f9be7f2599eae1bc3a009dcc5b97
SHA1f4491c10a9b756ae84922e1116d0bfe2c8f7c2ec
SHA2563a41fe18538cf7f11714ea70afb755c744bfdf82a2c40759fb3fa9218c450fe8
SHA512df6dcf75d59d570e47316f82fa6262e082fe23089054ea72aaf29354810867fa12ab59065053c08618b9abce36dd9ad6aa9cef754f7d12072debf15f2c2cf4fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fe841c6f723b257f8e882c6573d3fa39
SHA1ac4c8a48cf029e27c4afe0b2d8098e45f88b00f9
SHA256ceba4c187783a4cb629fd5a6a79c264b6034b1e89d18f70674fb7d36ab53ea6b
SHA5126f088b45dad9acc7b8e1f5d50a29b33b18bcdab6040b5842c893107ba48a26af6396fd46271e5519f3acae76d5ddfee88129014fc05e65008ad92605cbd3c9a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize72KB
MD52edae75825be83ac76f95f39d49d2b40
SHA17ece954f73dd4854a4e07855c9f027a2b4d64bac
SHA25616f0295eac8d6e219934304f3372e8922957a7a0eaeb720adc3fd86e53fe2871
SHA5129e3b4e4c33d224ec6f718cc540dfa9a642f054c203f7d4b964855d9f8c67509f472945bbe58963af91aae17149c480522fb6ca9ed11630ca300412c57b9d7549
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fb6c587d3515c88e43875c646aa945b2
SHA1789c19905e5ca341d7f2177bc808d6beace22d94
SHA2569de8d6058ab57cba571bb95a6d2b809175931d045e4db4f5b3719fb8bd131949
SHA512eaef1dccd793c4b0dcc50261c716e5bda30d5c0183137e92fb9b9ecc8ad231bba8574679361fb152b2fbd6b416734d42d9fa45748acda1095b7e33d730c9299f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize47KB
MD5e19b75babbc332ce76896831ff58279a
SHA14974cc973c77c570459e2359b09d5065efcb562e
SHA2564edaa24a663f4c92f2ac33d2c3057ad6a4746ae7fdaafc5b76c523579bfd75e6
SHA5129423e392282a32922a140bd2d0f567aadf592de0cd8aa2fa7cd649372862c1af0382908c0a092b9a4a50a4f82ece7b83712f746cb0731252afcad081559dd38c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize73KB
MD59616e605780d284ed3e7bac23b34b35b
SHA1f0842f505ee1a19eca6d0faae67bf87bd1ad476e
SHA256ee13e1804eae40ba9dfb978ab20091821eb42487f5dec5dab7c27bff94cc04b2
SHA5129521705f951fe38e33c3c33692608e71511d563456b01bed7a993e014913016a20b94570ef3d2802e957bb8ac4cac28ef8f84c448a1d50a99f3eb0c6abad84c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize73KB
MD5d0bdeed0b2c3e7cefab922cfd67945bb
SHA19da339fc99ec1cb07990dc4987c656bca6cceabc
SHA256915da2fe826bedd7d6991f859eefcfabf2e48c6a083f3c561a1c3b36334c01ac
SHA512545841665870edb6fbc1728e8c764036be24edd709f9434d1c78c012b616f1676b732137079556fe6d898cd883c293d15f3387834ebdcd31f7ffde0bc21f5a85
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize88KB
MD5ef33a8f6e3ab7300d37b9786c579e739
SHA1fde72cf15d67f5c6edd340ec7b74c93bcf51e400
SHA256d18ba575e2499d5daad58f36ff6a7467ece60ac87d86904042e3e0824c0294c9
SHA512f8d6b7feb28766d70be1a4c7390158d7b8e8f0daaa0033cdc8e124af855fd317adcc9b9bf28f346ce0a5c9ae3586523dba6431d103d559ca0c069428f56e3762
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize57KB
MD594ff057b5de552cd6d1ed770224c8246
SHA19bfb9a0099ccdb4ddb72f68fec0f95d880586b94
SHA25668d3868db73acc20b970f689396fa630b1688ca59058c62d0fa2e10577d56af8
SHA512dedde3a260aad260e9f8b59a736859617c991eb72d3ba274e140a2841af3b5ef61f7516e6d759d997ec0e712c642c1d73acdeb67cf8d074b079b2bbe845a5cfc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize86KB
MD5e2f63f2b9d51864104cb0d4a2ab31fb2
SHA1c6ffd2b7c4b4e427964c9dc899e4746715eefa6f
SHA256a8c26096aa974074b4780aade4bd62dd200c36aadd2759eb4f2b82ac4532e254
SHA512ab999d76100cbf38cbb31df96aa27ab554485c69c9f834394ad633d04378e83be49f4a4e97e85d3bdf150d40e72b60dcbaae47479f74ef4c9a888d43df43fdf2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize88KB
MD5dd537a2bea42a0b7d2ceb8b201090e79
SHA15b88f23090f8fe694127ad2f4c212cce2bd3a41c
SHA25673a22aa40c93b11141ae76fe1e909e7f51a657fa51ce55c1fe9f36113769b71d
SHA5128efa0df60c4bfdf59edad35d69dd3545b3798795b813791b6ba04093dd2ed95dd69e93e6457b6f0d17a1c2125ee4cd8aa78f018bb0cad76d3dfe1de75f7531bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize72KB
MD554914142aa7135f070113dee8a54b63c
SHA1e7aaf471e6618e0f728c62bd345ac87df787980d
SHA256aba6654057a1e4daf32f8b13b73af6d9be928b1dda87136b43168eea6d11a58a
SHA5122e68b6a8f54826b9169b1270e443b6f09ba1008d6b68cc03e98cf696563f3c2f8d172977174cce98986254b9c92db91370dfcdc9fe331a9d80bdf8b1e2e24cad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize87KB
MD5fad659ed01222d95890e08548a9e8d4e
SHA15cb3bfe77942138d1ebf70c08307f4a91999add6
SHA2560e400f52521de4683a4d2062ec64351319668d4e1fc74078aadf7619899d114d
SHA512da0e81f61c2195a3255ec164e6e6305fa1339cc435463413f31d5d343ad8ee080e39d4da29454c3130d032cbf1877b86ce90d5dd0fa5a7899d76a19a5bbb3192
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp
Filesize72KB
MD59ca50e686fe58fdf2637fbe71742b62a
SHA1f8d7398fb789fb710e0f2d9448c10cedcedf8868
SHA256285e165fc7f8e8952ad6e30e67d68f356059b2a7b3fd6a1e81843f15ccae627b
SHA5127b2555102c48fc1c592bd4d4caa1e9c6cd8706ea3e8efc17edda1e20873ef9331c551e96a74dd5b75a1dac7f76b6deecfc72af90449c126a8e918a0071837e7a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\025ec69d-fa0a-4060-ad05-68d2f560e9d4
Filesize1KB
MD5026a91aa61d65fa154771ab231e0d69f
SHA1f36ed30f201d3f9ac3aa52e40b32756b22d52452
SHA25610240c49552dd26f3e10b788c40dbad410abd2ead38ba8a6bdac7748fc04f3c3
SHA512434b70340cefbe3e79db98b7a944c1a84dd610077dab9ee32d11e5fa0881c9ae958f767ecadee90f57e82ee6803e48932bbadb0f224be83bc2eb7776c6c48435
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\026a4b08-9262-41dd-851d-4841a28354de
Filesize27KB
MD5de357b6e3ccfcea5cd5873f2131b95cf
SHA16278200404cf5bd6cb54b06a64aaec489a853f85
SHA2563e99d46fda78a5630cbf8a85f186dfaf679f48d0b559bbf107b584a090e0443c
SHA512c27a792ccfb3094771a6acc779de1966db81dc31bd84e61eaf7513f99b308494212a631c85e89d0e41fb075bcc0a7f6d1e3a7e2e42002bb208fd11849db1ec3d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\03dfebab-22af-4c72-bfc0-2c1ca7a99685
Filesize982B
MD52e4151ca3aab9bf735efd22d038fb09c
SHA1ae805f62a1669ac279f329ec7132ce7652f8dc9e
SHA256e2958717bc633f03b1a4daab2d410e184963d09446b5ee5f7634dc67b5593b68
SHA512ba6287d82ac3af895d5a47ce34a6f53794efeebea1391b668b2bc70a9510502db6788df96195f40eb473dc090791552952bc69b669125d6bef53a86a885a1f16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\0bf64761-6fe3-413e-ba97-eb9f4dcf79ec
Filesize19KB
MD55c4dc454ae41be07be3cd9594187ff80
SHA13b999f92d0a4fb040a04cedae1dec87ff19242f0
SHA256de9dd293c421d646c5f8f193f77e2cfd6594b35fa63aed4a0462bf3c590e6510
SHA512ad374dc4d263d919cdad13dbd16cc9ddecb3365a748c9535bbc600ff5b7bb2f2e803ad26b01e82a8ccaea03ce0bc465d80d41cb9d0b8c476e0c710d7ce923bb1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\0dc8ebb6-660e-4faa-b2b4-b4d87983d973
Filesize671B
MD58330bc461364f413aec3e3dc89fc8326
SHA11719b9c82f3dd445df577a688f4c47a37a85de8a
SHA256e8e4bef19141413baa1d95f8716fad5a75373959202ee2bba72909274bbad4bc
SHA512dbf3f67f94c7e75ea6607a9dcda4d6baf275000a12b9027f16b213c434fa6ff6dd352536d5901cc4f4879b5c51c70b7b169b1674fc5b32b674330a8f979d1070
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\23a8afa5-eba6-4b73-9031-3b38ca0149c8
Filesize989B
MD535fce6a9da34ecb593a11c80212a2fa2
SHA1df79afc9d506a486af44d7ba7d9f55e8f1ff457e
SHA2561726e17388edd361ecbd8ffb0afb0bd61225566e0566a00e5a1ea9e759bfae0a
SHA5127de91f3d8bfdf08291f5d90219e638e50e4978bdc7c488ea2769bad8aa68507e3ceb8fcab4cec446afb9d8918e9f451dfbd58d346336abf6efc3083028724313
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\265b8e10-07ed-4e65-a373-9f96d6213d86
Filesize1KB
MD5e39068d5d4d6db89bd7f591601f7b4bc
SHA15b5096719fbfc4eb5cc04c8699f1191b61c29639
SHA256bcc586cb8e540b142587f9142a0b3c7e14aaf5b07e51eca65ac347ae476cd530
SHA51267f52a955dbb6492aee56ca60a7b7703330238bf5d8ac6412069ce0cd1d9aac7d1054b6318ccb51f623747f4d9fbb00bef0c3f4fa8263cafc14c71db5cc56fdf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\29f46810-effb-4346-ab69-e72b704efb50
Filesize15KB
MD589207b652fec91b58ccb9596e1558e96
SHA1e4e3b8afbedd51ab4534f34203cae9286c5f0a65
SHA256da8512356212faffc6f7227d05e06bca3c008a3c6c493a98efad31dcf17a87ad
SHA512a0277644665f88889cf7a24b20e122947b2822c8d0dfd56cd309666c41c3516d88714d46a961754639309408ceff8568f61ce2120b3049ba45e74aa5aa433078
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\31d867fd-54c4-4a95-b641-9f6dec9b986a
Filesize1KB
MD525a2a89e46a6b78fe5711fbb55427978
SHA15df8f2b91592239bc2dfc565a10c06210b836ade
SHA2565aa09cd1df3aa315e14d1ad5aa35767d43a7f788abf9d1a84a868bab818ce0a0
SHA512de02a70ac89cc775269b455b3be3dc08da44f6f088d6317bc5bed681a1c06ea1f524538301107cc66a41db5f0ebf6dea45538e6d07ebd06467d25ef439c05184
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\47489b60-4c40-492a-9698-a09ba9ec2159
Filesize734B
MD57b7c82bc6f5ff80acd12f16d051d2a9b
SHA18c2ab7a20b8e9cf0968df201dad135020c44efa7
SHA2568b5a58d3aba5f0f7eaaf6f683507db12484dd8c96759c2e4e8b35e9efb9b378a
SHA5122b999d66834976a73ab62c3fcfb026daafa5c1682771491b38560d3779be5efda034c2ccd11c0954597974bbfcc3feb4a7ba0cca988cdac5d3aa4886bab612ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\7c12d61b-aabe-461f-b889-7ef5f8939801
Filesize23KB
MD562a0e709c29d7fb39ee7425f7de29a06
SHA1985a8a9e19b053d2f552c5ecbc79acf402072a82
SHA256c78e5224aef9d7ff53403c642c9a4062582c502496b1f454990c3452de0e7be0
SHA512765a7aac42914ecade9fd159cb21dfbe05a4411412e01a1604595644337ecbba99d0b8fe34d4159f3bcb8db6765bace9f30bfe7212e03f46a1723fafd27b2c2d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\a3bf9397-30d5-4914-9054-26293a6a3c19
Filesize734B
MD53f1657df3ee3c7b30b2c3b0cafb260f3
SHA13e2123cf757dc8286d3ca0eed268694238119df9
SHA25610c2c5df6e41dd3edff695fa9705301e7e805940cfe38133b7a8f4eae0003359
SHA51256066c8ecf4988f060e731c275e5309a4e019221f4a9c106a3faa57464cb8dab1abffc0b140be024960dc628afba1b8eb745943e1ec2612c2b8ec3fd5e06d78a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
5.0MB
MD5a4093c5c6d6ec6a58ffca795915c8bda
SHA12be9e88bc3b33a227e1447d2080815ea4a466c3e
SHA25615b43391c0365f55795e82b51f19edba407d059e54f23793b986a44eeae02349
SHA51239aff356c9132f1510050311abc7bfcbeff428eb38ac42ae2f818e63683346122a13a0c4994f148d516fbfb4a42215831e60964e84db4899341b020f626c3a7b
-
Filesize
13KB
MD5051204aa4568370a628ea5fd2d5a9329
SHA136f1f0469e967e1a94af4667c3bdd07ab0c34773
SHA256ec48102c6f8b07faa5446283f1209807fa540dc90f7f96ae0a49bec47c921d22
SHA512b9ae1885a9d17b90b4753626046dc162be4ec2d22537792fe435411ba07621f2bbc86f1abe3bfa5e6ec20b763a6469720d8c7187758934c931c1b2f03884f060
-
Filesize
11KB
MD5c6a6508e3300b588d93358e998764578
SHA177f3af9fb3d44e6a7dc185b3e83c5c08c99569ba
SHA25635941a4678ee365624e2555ced628050a091b7e34fb427ea205cdd659918ee67
SHA5125d29ac07f6841f14c2281e9616947c21e05ffd4ded347a1993f32dd16f20bc587192f54e6c2b9b10b299b649005882183500cc0006d55d16cfeefb3cb415d4db
-
Filesize
13KB
MD5ebeb2d33341950f8717ed16d073713e7
SHA1e54b990c04a7474337b806fc26b9c5a361292472
SHA256dbe5cffdb86d10783b7e39f3d3b55990e976c26334812ab4edc705f47e0c3328
SHA512eed51fd8d68c977f93f7d392c4b3c1b6ed12726bfc660e4acb5ad7238148c29889777e1f26542f4f66949aad8e1e33639abdb46649b913febc68d1918a717ccd
-
Filesize
13KB
MD57f32e4c7614051b0ee8ad1d1c154bfda
SHA12232fa371e7cc742a5e6a2d873361d51fa3b77ea
SHA2568a99a2763031a854a9c2ca9a671d19d035ed68ce2fed35a29a8961d26c107cba
SHA5127073a3bec8e5d9d7c081c9bdb1dc81ae55bd9dab96754da68c6fa4dd40d06d1b394e0e54670cf44af2631920d61b3a6db6ef487f874962278e6897c0287549c5
-
Filesize
11KB
MD5e6b63d12dea6b52d72b2f2a912315343
SHA12705a377a3aeec28f35fa31b89485e3f3d2e456e
SHA256d3b240c19f19256db18ca6b7980e2f47ab8dd6d3eabf04ad836b0d0e985a8719
SHA512ac7922af6bd1cd407c1d0ec66ddcc8c891c9758385104198e49e76521f0a704d4e0c9df80e01e398f55cc570c3b923073d19735f21ee0c4c52bb5ba0448beeff
-
Filesize
11KB
MD5293d365fb836fec5ee490348f47bbf2b
SHA130a8f61004e61ca8fd47cb16c2b3fcd550b9bfb3
SHA256093dcc76cbe7ef4579946515f6f0a9b0822e5dc8360d524482f35d898c67fbcf
SHA51235b8679a277abd3394119752fb63f83dd80b9a88160d6de864f3588ed74bd9a8fb1bd98d97e63501dc15117b875f0b51c491c31e47554e2cbaf6abe7c15a613e
-
Filesize
13KB
MD57a87a354336ba6de77e7e48edea7d3ab
SHA19d76e043de84a19ef1cf0697462a55936253fa74
SHA2564774e37a8decb1c4de0a4325137458352dcc860a2baf927db57272f4a56dab64
SHA5127603fe5142a5d204e0c1772c3d7ea4c6f160c037b89458f25cb60a8fbcad373f3c6e157d84a19aa9bdabab63d7f2ca57f05a50efad0ab8afb8ccd20aa7276fd1
-
Filesize
12KB
MD558cbe1bfe15500ce1f8f90da238bd604
SHA1b2f0d9b0f1aa0e13126763293cb773286e72226c
SHA2566ea9ff451d71b12de186a472875146ea6e9ee44e3eec477c8011ec40a669c7b9
SHA512f314302718603a219f1ca94005ab5d5ad6979dc4023f5e308e4699bbc61127bb0350936cf0762f2df227947b1a1f421e9f3fdfe56aeeca3c8d95f93c48fdf74c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionCheckpoints.json
Filesize122B
MD599601438ae1349b653fcd00278943f90
SHA18958d05e9362f6f0f3b616f7bfd0aeb5d37967c9
SHA25672d74b596f7fc079d15431b51ce565a6465a40f5897682a94a3f1dd19b07959a
SHA512ffa863d5d6af4a48aadc5c92df4781d3aacbf5d91b43b5e68569952ffec513ff95655b3e54c2161fe27d2274dd4778bad517c7a3972f206381ef292808628c55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionCheckpoints.json
Filesize193B
MD52ad4fe43dc84c6adbdfd90aaba12703f
SHA128a6c7eff625a2da72b932aa00a63c31234f0e7f
SHA256ecb4133a183cb6c533a1c4ded26b663e2232af77db1a379f9bd68840127c7933
SHA5122ee947dcf3eb05258c7a8c45cb60082a697dbe6d683152fe7117d20f7d3eb2beaaf5656154b379193cdc763d7f2f3b114cf61b4dd0f8a65326e662165ccf89cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionCheckpoints.json
Filesize146B
MD565690c43c42921410ec8043e34f09079
SHA1362add4dbd0c978ae222a354a4e8d35563da14b4
SHA2567343d5a46e2fca762305a4f85c45484a49c1607ede8e8c4bd12bedd2327edb8d
SHA512c0208d51cf1586e75f22764b82c48ecbb42c1ff54aa412a85af13d686e0119b4e49e98450d25c70e3792d3b9c2cda0c5ab0c6931ebaf548693bb970a35ae62b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionCheckpoints.json
Filesize259B
MD5e6c20f53d6714067f2b49d0e9ba8030e
SHA1f516dc1084cdd8302b3e7f7167b905e603b6f04f
SHA25650a670fb78ff2712aae2c16d9499e01c15fddf24e229330d02a69b0527a38092
SHA512462415b8295c1cdcac0a7cb16bb8a027ef36ae2ce0b061071074ac3209332a7eae71de843af4b96bbbd6158ca8fd5c18147bf9a79b8a7768a9a35edce8b784bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionCheckpoints.json
Filesize288B
MD5948a7403e323297c6bb8a5c791b42866
SHA188a555717e8a4a33eccfb7d47a2a4aa31038f9c0
SHA2562fca1f29b73dd5b4159fa1eb16e69276482f5224ba7d2219a547039129a51f0e
SHA51217e2f65c33f47c8bb4beca31db2aff3d4bbb6c2d36924057f9f847e207bdcb85ffcbb32c80dd06862ffc9b7f0bd3f5e2e65b48bb1bc3363732751101d5596b1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionCheckpoints.json
Filesize228B
MD5a0821bc1a142e3b5bca852e1090c9f2c
SHA1e51beb8731e990129d965ddb60530d198c73825f
SHA256db037b650f36ff45da5df59bc07b0c5948f9e9b7b148ead4454ab84cb04fd0e2
SHA512997528e2ecd24a7e697d95cd1a2a7de46a3d80b37fd67fac4fb0da0db756b60a24648b7074255dc38f7651302f70894a53c3d789f3d7cd9f80fb91bd0cade4be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5ea4880bef8a56b348014dc71fccc583c
SHA1342fecf317dc8fbf51f2d62a55d6dfa8d6786da5
SHA256524ba0af694120c7ce5fa9301827c08116bed4004e4dd7573915d741a66e8eaf
SHA512f5ab47517448d39d857feceeb19c620fad61d804b72891f2102d874c8e97e9e9f5c0b61e7b0f0462d02dc4dad345cdb916982229750a1ab5012cad17038c97eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4
Filesize50KB
MD530fcc3ca9efd4827f4b7c11a6739ec51
SHA142fb1b4ab1fd7b5fc5d35b9d3f6ce9b21138d3b2
SHA2567ae8c60f0bce6353ae2233aee9eda1c25cb52b14ae1f68ada079c0346c78985b
SHA51284dbe710d90debd3bcb7a66bbd0c1b32def05f061d67098048d3f9dbf0419b8771e6f7598dca7fb3e5813cdc7d7dd046682c6c297d7dc7eddde18841039bebc9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4
Filesize55KB
MD582405c118b4c5f4e52e3be66818a32c3
SHA1f1bacf0db8b65aa2c53c8c7fda4a28d022ff6d9c
SHA25624f4b0d20ce2da0949aa526c2c61e7c88fdec2c8bdee956317dd14fa6de255ca
SHA512ac44164390d3419fdbfb2077bad9d01abccce8f421ea7908fc6bad936cbc9c1cc634cfb75279b8ab7c11a5b63d4acf77622a372a3670e638b49e7c4ee5ad01b5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4
Filesize48KB
MD55ee00ed39da0a85689d30015efa160f6
SHA1aaad7da40a91c6072bda3d845e7d9324c6a0d79e
SHA2566e7b56e85d36318ab52e36e02cee9b8db56b357ecb8ea42df629f7aa0246738d
SHA512738d9a32ff2b0be27d8436a4531e472bd1dd926dcb9d445f3d813b1acbec1f818d08d19e83f0f49cdbb362e5c8a80ea5a1a1a2bbd8e3d31750a15b36e00e1736
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4
Filesize55KB
MD53dd96ea6dddebe6b80cc5d7b5578d241
SHA1c43c2816d0f17138ae62e9527c5692fae361ca2b
SHA256c90173ae7481bb44d1889b2c1a3c703e912323b7f7d2cd71e88d0b584ab41ed3
SHA5129e6abdd215f7494d0c9608720db9633a576ef64fdaa90e865627f7916f7d578174b6653f9eb7418dd067f92266e72a7357bb8eab95682fa740e11d36a059cd27
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4
Filesize40KB
MD5519cff7277723c5d3c34029b4254ba51
SHA15dd180476ef9c09a0dcf21912f4976f60d4052e8
SHA2562826184eb966e69146041602a1fefe49fbe26aa590aa87308e49d7998ae4bb62
SHA512eca8333e61756943816bc8a8b772b6d6e0aa75af16740bd251b8e6de2d951868910cfe19da058567fbc9a75a9bec1c82fc5d4ceb3b260671ae63003e9d3804ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4
Filesize51KB
MD5636a4ab015da831dbe2d710713575b00
SHA149ecc313679e565386e988c47f2ac53698bd2dfc
SHA25649254a4372c78f5c1cfe7592cd503d2a1d0c352d4643b722d96bf06bf6accfd7
SHA5126359b685eebc5653a3f66d8e1b125505c4d8e3142c10f2c585c1e02dcdb0251604fc2c818ca922127af39d4a691d3c663caeb48edae41541c26dd39c5a8cb407
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4
Filesize47KB
MD50351cdf1b29f9fff11ca6eaab823a87f
SHA19a383ce77f2ad73adc45d5e3b8c853fbac167a9c
SHA2564a8e62b6f47ee57b677f1f6331ea769e8650f0b07fc651aff7cf175ae8613a90
SHA5120438014bcdb515757ed94a3020c6f51cc6b083ae65d3672376c81f5ca203df7051e407551479aab449ec2f269113ec353c4c209fce56f83ad75695bc8be8c0af
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4
Filesize55KB
MD5c0e6cdef00804d397b231c9d83c076b1
SHA1015589f4ca6d894c648ca3304f33658098f86cc0
SHA256b50b05ab7a5f607a320698d189c2ac79f60b34902d55fd83332c9c6cecc7e064
SHA51224887c6190b2f0cade963d46f75c6515b0768b3db66dbdf80091598592f3c56099856f155b505256fdc293b9836f1fcf319aab169f0f484e40ad05c5c3b05b4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4
Filesize47KB
MD51d898ba52283d0c0e76f517986fab765
SHA199d22975788423aee0864165a2ddcdf3886776d1
SHA2565cdc0cf1045d0a909bb2aaa6e55ab49f3f5012c36ecbb4d53149bd93bf75b093
SHA5122e78b26d7206fb0ebbcbf22d2bade070c174bd426a725c54720ec034355b063a45e88e0b0ea4fd8a30acd639421908adc4a701fb64cf4632d1e746b4d914d216
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\storage\default\https+++web.telegram.org\cache\morgue\222\{4250d778-a06a-458f-9863-99f9b707dbde}.final
Filesize87B
MD56401a91595fda8781731c72d1bee74b0
SHA1b6af052a429790bcda992ac19952945983c78745
SHA25688ce759fd87f1fcbe30b89fb05f95d19cd03245c176d3c1b2465761c6fbe8f08
SHA512672a41a8a718538391a5d95f1bedca093cee0912440930a93221d18646b18b25adea469d1c3e0bf69579713748f3d67d4578255c34c861543dff363bd752574e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\storage\default\https+++web.telegram.org\cache\morgue\28\{78223b08-8078-4834-9e09-1ec4fb52961c}.final
Filesize5KB
MD590608c69271f2061e42f56ed67cc5024
SHA1b78ce0f7e3f7dbbae4db7770b1b958d11f399290
SHA256557e710adb02659b86fbed16f5d3d762c849ddf7317728279339e81e8ad40c50
SHA512cb4ab347d0777aadd2b573e663583dfda2743298d0f7f44e77790944ad7da63cf63a45ab1ed301b9684226efe4ae8104990d894b74686b18e1951a733fb05bd4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\storage\default\https+++web.telegram.org\cache\morgue\86\{67486a22-74ea-42b6-95e6-e831b1191256}.final
Filesize11KB
MD5857ee156b50921d390251565beeaed12
SHA17a56bd80d1e0d732be48f25817f7cf65a1ecfbc0
SHA25642260997866b5c698552a1ac2768f284b5e647fd400dd7cd8f766e5961ad72e7
SHA512398032c09d6179e3ffab2a2ea9426fd7f6214e57da18416dbe95695b507376c1dba44351476f6d18f39f626ecd2d4f86ef0a78a901a87f41c8ace04e47744358
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\storage\default\https+++web.telegram.org\cache\morgue\92\{ae89c62b-2bb7-4ad4-9e4a-77ddc012d25c}.tmp
Filesize39KB
MD5a37cd1359812d8cd6c4e32834fec5723
SHA1c21d9a370cdec4ee72bd149f95fa12c99410af1a
SHA256c91fd317ea5fc44bfa3f0e90063df85a00bc2eba193526f91145ebc130a03c99
SHA512cc02f6328a574cdd82904ff373f68aea9994ae1fe1aab45e30a70655460a5e37097679bcb1d2ad6321bdd3d0e7194d1a7c47eb2762035c339439dcbe3e1bf623
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\storage\default\https+++web.telegram.org\idb\295338591tatt-ad.files\8
Filesize404KB
MD50db736799f5736abc1f5c3b4f259f57d
SHA139b579064122b489637d3e425c088e0def130adb
SHA2561f83296d7150629a6fd901aeadff028cbe028ef2bd87c082b341044d69586122
SHA5122861b25dcc04a2e80a052e2c534521f71f1604b7ed1e065a44fc5348d1710f48aeff8cb47261fd1837f966c666747a4016b0e96eb17c4fd6275a365a9b5fc785
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite
Filesize48KB
MD5a6f41899cc284db1295dc73c28e937a4
SHA15bd2e59c37bf0c040b49d059eed27a23b8189ff1
SHA2560b3c5cce110413737c699b63d8aa2da1cefeb8184fa88c428bb199e9e5e5df9f
SHA512daf5f5fe0f0d5a5f8064b383eaf315a3840561dd6de1d6dddd05573cc2fd7e2c49ea19798f4b72203df09c3415d43822b48aaaa9c0a35c141f6e5e7fe194fb2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize576KB
MD559ff55b3bf46d86b60f34a0079549046
SHA19c3c720a0c17c8166ecbf32ccd9a791b713df693
SHA2565b1fe777535eae836a9c76c05e28ae2abc2251a816f197281c3721e59146751d
SHA512fa74b6c7273eb6e9533743111320c22206d424b41da8f0756385736d5d3a5b00f4251c548986a502b05e9dc882e1ab37e1c7d3462200cd0645f72b66651df630
-
Filesize
217B
MD53c7edbdeecdb47fba617e3d03c36b0d3
SHA153628ce8c5170810fabafab8e001bfd971d47825
SHA256c3db6f2519b071b7441022f9ed508b0da5ba40295be0ee449a27bd6146595d04
SHA512bbf56ea374114173f7de198cd71ac6e75276b0f30926c6690db512f45ac2e54d099d990c285578f702696494d2884d8550e5dddadeee01077933034ac3817842
-
Filesize
141B
MD5d7a9c29a5421078a9135ccf1cade552a
SHA1e1b43108778d359d8d9287cf59225617e1769463
SHA256bade20948c677d1d458e39a4cf6d8c4d8237263d55e63370d6272fa3243ffe28
SHA51249553b13fa1cc8d257f2ca9056742e6e11fbdce21633edeb5af6f863294f97ccf3cabe851d94bcedba03e2716311a48dcf8064eb1500f8a7c400b049bf48296f
-
Filesize
337KB
MD514e838708a72f2950f02f317a3020833
SHA1d6fed1d594af2bace7c883797ce7d613a960be81
SHA256fc22c2bdb28f2e95a099b5b92392b591933f5eca2a0fb147cebeea4591676c26
SHA512c6d7e7afd4e0bb274b0c3a0fe8b2f2a50639a8807b7b6c5e38c48b178d0546a4d9ad9bab3a9735bb19614a74501936acc453dc38d0e5de5ea83358ad4a873ef2
-
Filesize
2.3MB
MD51b54b70beef8eb240db31718e8f7eb5d
SHA1da5995070737ec655824c92622333c489eb6bce4
SHA2567d3654531c32d941b8cae81c4137fc542172bfa9635f169cb392f245a0a12bcb
SHA512fda935694d0652dab3f1017faaf95781a300b420739e0f9d46b53ce07d592a4cfa536524989e2fc9f83602d315259817638a89c4e27da709aada5d1360b717eb
-
Filesize
1.7MB
MD5dd410c316152077eb8a683ed981fc787
SHA1360b90cd99dd9ead20b21e50c73a3d0fe10123c1
SHA256036128ca60c543609bf2c6c362e2f909c85f1760d4a8d6b07c55b73d36d9df0b
SHA51281f4dceebe93a89b239076937df31bf28542b23ed8e383ca9b30cbdcd89b3d8683fc8fff9c78d74c1ced281e766cb852b54b6c5b5640b6cb0224b66c747d8657
-
Filesize
243KB
MD590f510fb415352d1b86f6b477bb4c165
SHA11d13ef79b98edd93b851a515cd6b6641039b1e51
SHA25619ff57b6fed2efd3ea4d31f6445e43eb151951db9c21bf5ba97803daf3966253
SHA51295bad3ed63d397ae61a3846d23ee2a2d46eb9a78786aa3e808727e93c517a2144fe9a6b7918a76f6f641fa12a21f9b225bcc6b371f9fe04580d52a9bed2778e2
-
Filesize
65KB
MD579134a74dd0f019af67d9498192f5652
SHA190235b521e92e600d189d75f7f733c4bda02c027
SHA2569d6e3ed51893661dfe5a98557f5e7e255bbe223e3403a42aa44ea563098c947e
SHA5121627d3abe3a54478c131f664f43c8e91dc5d2f2f7ddc049bc30dfa065eee329ed93edd73c9b93cf07bed997f43d58842333b3678e61aceac391fbe171d8461a3
-
Filesize
10KB
MD5d7309f9b759ccb83b676420b4bde0182
SHA1641ad24a420e2774a75168aaf1e990fca240e348
SHA25651d06affd4db0e4b37d35d0e85b8209d5fab741904e8d03df1a27a0be102324f
SHA5127284f2d48e1747bbc97a1dab91fb57ff659ed9a05b3fa78a7def733e809c15834c15912102f03a81019261431e9ed3c110fd96539c9628c55653e7ac21d8478d