Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-08-2024 14:32
Behavioral task
behavioral1
Sample
artifacts.zip
Resource
win11-20240802-en
General
-
Target
artifacts.zip
-
Size
139.8MB
-
MD5
d0e1b50214b55a05c9c36f5d6af0e5e0
-
SHA1
29d6d783b4f55c9293e75d63dc58c92ad757d7b0
-
SHA256
d34d5d293ef589bc20d27d216385f34706a8a049460633a9476222e0a3bd0680
-
SHA512
021c08bbc3e30ff672cc69210295598b84f8d2aa33a7c42e11fc09a1b6b70627aba5281bf2903040d06f2049f1b4cbbc6684d280531a9cf89cc812f65ed4810f
-
SSDEEP
3145728:RyRREc3Z0CqFp83bUchCAXDSlBAvPkKkzc+wVlOljKhvsPnN4yo8EmQ/Wqu9:yJWHG3LhCVleHkYlOljtN4GQ/Wqu9
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 488 powershell.exe 5612 powershell.exe 5812 powershell.exe 5208 powershell.exe 5688 powershell.exe 5952 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SET86F9.tmp NPFInstall.exe File created C:\Windows\system32\DRIVERS\SET86F9.tmp NPFInstall.exe File opened for modification C:\Windows\system32\DRIVERS\npcap.sys NPFInstall.exe -
Manipulates Digital Signatures 1 TTPs 13 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\3C0D087ECDCC76D1084ABE00F1FEE5040400AE37\Blob = 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 certutil.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\4CE89794FE2D2F7E30121F10BCF76AC3CCF77CA9\Blob = 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 certutil.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\E1D782A8E191BEEF6BCA1691B5AAB494A6249BF3\Blob = 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 firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7\Name = "szOID_ROOT_PROGRAM_NO_OCSP_FAILOVER_TO_CRL" certutil.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\60EE3FC53D4BDFD1697AE5BEAE1CAB1C0F3AD4E3\Blob = 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 certutil.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\3BA63A6E4841355772DEBEF9CDCF4D5AF353A297\Blob = 0300000001000000140000003ba63a6e4841355772debef9cdcf4d5af353a2972000000001000000350500003082053130820419a00302010202100aa125d6d6321b7e41e405da3697c215300d06092a864886f70d01010b05003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3136303130373132303030305a170d3331303130373132303030305a3072310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3131302f060355040313284469676943657274205348413220417373757265642049442054696d657374616d70696e6720434130820122300d06092a864886f70d01010105000382010f003082010a0282010100bdd032ee4bcd8f7fdda9ba8299c539542857b6234ac40e07453351107dd0f97d4d687ee7b6a0f48db388e497bf63219098bf13bc57d3c3e17e08d66a140038f72e1e3beecca6f63259fe5f653fe09bebe34647061a557e0b277ec0a2f5a0e0de223f0eff7e95fbf3a3ba223e18ac11e4f099036d3b857c09d3ee5dc89a0b54e3a809716be0cf22100f75cf71724e0aaddf403a5cb751e1a17914c64d2423305dbcec3c606aac2f07ccfdf0ea47d988505efd666e56612729898451e682e74650fd942a2ca7e4753eba980f847f9f3114d6add5f264cb7b1e05d084197217f11706ef3dcdd64def0642fda2532a4f851dc41d3cafcfdaac10f5ddacace956ff930203010001a38201ce308201ca301d0603551d0e04160414f4b6e1201dfe29aed2e461a5b2a225b2c817356e301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f30120603551d130101ff040830060101ff020100300e0603551d0f0101ff04040302018630130603551d25040c300a06082b06010505070308307906082b06010505070101046d306b302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304306082b060105050730028637687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944526f6f7443412e6372743081810603551d1f047a3078303aa038a0368634687474703a2f2f63726c342e64696769636572742e636f6d2f4469676943657274417373757265644944526f6f7443412e63726c303aa038a0368634687474703a2f2f63726c332e64696769636572742e636f6d2f4469676943657274417373757265644944526f6f7443412e63726c30500603551d20044930473038060a6086480186fd6c000204302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f435053300b06096086480186fd6c0701300d06092a864886f70d01010b05000382010100719512e951875669cdefddda7caa637ab378cf06374084ef4b84bfcacf0302fdc5a7c30e20422caf77f32b1f0c215a2ab705341d6aae99f827a266bf09aa60df76a43a930ff8b2d1d87c1962e85e82251ec4ba1c7b2c21e2d65b2c1435430468b2db7502e072c798d63c64e51f4810185f8938614d62462487638c91522caf2989e5781fd60b14a580d7124770b375d59385937eb69267fb536189a8f56b96c0f458690d7cc801b1b92875b7996385228c61ca79947e59fc8c0fe36fb50126b66ca5ee875121e458609bba0c2d2b6da2c47ebbc4252b4702087c49ae13b6e17c424228c61856cf4134b6665db6747bf55633222f2236b24ba24a95d8f5a68e52 certutil.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\60EE3FC53D4BDFD1697AE5BEAE1CAB1C0F3AD4E3\Blob = 0f0000000100000020000000eec58131dc11cd7f512501b15fdbc6074c603b68ca91f7162d5a042054edb0cf03000000010000001400000060ee3fc53d4bdfd1697ae5beae1cab1c0f3ad4e32000000001000000c0060000308206bc308205a4a003020102021003f1b4e15f3a82f1149678b3d7d8475c300d06092a864886f70d01010b0500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3132303431383132303030305a170d3237303431383132303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b302906035504031322446967694365727420455620436f6465205369676e696e672043412028534841322930820122300d06092a864886f70d01010105000382010f003082010a0282010100a753fa0fb2b513f164cf8480fcae8035d1b6d7c7a32cac1a2cacf184ac3a35123a9291ba57e4c4c9f32fa8483cb7d66edc9722ba517961af432f0db79bb44931ae44583ea4a196a7874f237ec36c652490553ea1ca237cc542e9c47a62459b7dde6374cb9e6325f8849a9aad454fae7d1fc813cb759bc9e1e18af80b0c98f4ca3ed045aa7a1ea558933634be2b2e2b315866b432109f9df052a1efe83ed376f2405adcfa6a3d1b4bad76b08c5cee36ba83ea30a84cdef10b2a584188ae0089ab03d11682202276eb5e54381262e1d27024dbed1f70d26409802de2b69dce1ff2bb21f36cdbd8b3197b8a509fefec360a5c9ab74ad308a03979fdddbf3d3a09250203010001a38203583082035430120603551d130101ff040830060101ff020100300e0603551d0f0101ff04040302018630130603551d25040c300a06082b06010505070303307f06082b0601050507010104733071302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304906082b06010505073002863d687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274486967684173737572616e63654556526f6f7443412e63727430818f0603551d1f0481873081843040a03ea03c863a687474703a2f2f63726c332e64696769636572742e636f6d2f4469676943657274486967684173737572616e63654556526f6f7443412e63726c3040a03ea03c863a687474703a2f2f63726c342e64696769636572742e636f6d2f4469676943657274486967684173737572616e63654556526f6f7443412e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0302308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e301d0603551d0e041604148fe87ef06d326a000523c770976a3a90ff6bead4301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d01010b0500038201010019334a0c813337dbad36c9e4c93abbb51b2e7aa2e2f44342179ebf4ea14de1b1dbe981dd9f01f2e488d5e9fe09fd21c1ec5d80d2f0d6c143c2fe772bdbf9d79133ce6cd5b2193be62ed6c9934f88408ecde1f57ef10fc6595672e8eb6a41bd1cd546d57c49ca663815c1bfe091707787dcc98d31c90c29a233ed8de287cd898d3f1bffd5e01a978b7cda6dfba8c6b23a666b7b01b3cdd8a634ec1201ab9558a5c45357a860e6e70212a0b92364a24dbb7c81256421becfee42184397bba53706af4dff26a54d614bec4641b865ceb8799e08960b818c8a3b8fc7998ca32a6e986d5e61c696b78ab9612d93b8eb0e0443d7f5fea6f062d4996aa5c1c1f0649480 firefox.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\3C0D087ECDCC76D1084ABE00F1FEE5040400AE37\Blob = 0f0000000100000020000000e5657d41869c485f7a75539139120605e5dc5a373a8f8a96e3c2b30140cc76220300000001000000140000003c0d087ecdcc76d1084abe00f1fee5040400ae372000000001000000c6050000308205c2308204aaa00302010202100aa60783ebb5076ebc2d12da9b04c290300d06092a864886f70d01010b0500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b302906035504031322446967694365727420455620436f6465205369676e696e6720434120285348413229301e170d3231303530353030303030305a170d3234303631303233353935395a3081d2311d301b060355040f0c1450726976617465204f7267616e697a6174696f6e31133011060b2b0601040182373c02010313025553311b3019060b2b0601040182373c020102130a43616c69666f726e6961311530130603550405130c323030303130333130303133310b3009060355040613025553311330110603550408130a57617368696e67746f6e3110300e0603550407130753656174746c6531193017060355040a1310496e7365637572652e436f6d204c4c433119301706035504031310496e7365637572652e436f6d204c4c4330820122300d06092a864886f70d01010105000382010f003082010a0282010100a6ec814ee2c7075e2e29ac7ebd10b6188055929370a213b83fb6e337d82ed0756d15e267f6bc645e6db5bb1d586ef1098ead1595147d03897af04b666aa5a50def2b3af23974896c6fb4f5246baf3ec374dbfd90eeec7575ffb11a6efea7a0d7da0adb04eaf000b1ad520d9e9529b2a8cf420998d4c7a46c1f95e405e35f69ad8c05d62df0f9745017a6284134afba26f905d900da1c412200e6ca5c6b148f3f785aa0ebe35ea9160644bd6924b54625eb404ab39db981f6b216b6dd960930a1443b26aab08cdbcf1c5fd74dbb56c3e9df791f8429401dee5869e90c39f95000fc616b5ac8396b588e24407235ea074328c608112f6cb4f07347cd4d28d28ab90203010001a38201f7308201f3301f0603551d230418301680148fe87ef06d326a000523c770976a3a90ff6bead4301d0603551d0e04160414c5b210483c7598f90d32838cd0763d3cd85fef5130350603551d11042e302ca02a06082b06010505070803a01e301c0c1a55532d43414c49464f524e49412d323030303130333130303133300e0603551d0f0101ff04040302078030130603551d25040c300a06082b06010505070303307b0603551d1f047430723037a035a0338631687474703a2f2f63726c332e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c3037a035a0338631687474703a2f2f63726c342e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c304a0603551d2004433041303606096086480186fd6c03023029302706082b06010505070201161b687474703a2f2f7777772e64696769636572742e636f6d2f4350533007060567810c0103307e06082b0601050507010104723070302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304806082b06010505073002863c687474703a2f2f636163657274732e64696769636572742e636f6d2f44696769436572744556436f64655369676e696e6743412d534841322e637274300c0603551d130101ff04023000300d06092a864886f70d01010b050003820101008b2182887ada0e08e4afe89019ded16e88ff6ff1b12fd9b2994b945b8c76c63862ae35a1751672c474c8575a039250105e346bb7ce7ae1f2494e760de418b9453f1bbac9255b0dccafd296adb3cdb49d46d54c3413bfc34a3e640e244da7b1e1dbd1b04cea414ff64fe57f0ef28944a42e41065548e4834f2b05d4aae8516a1f154c5b09af25fe059a69a7dc75a7deb4cf3068c402614ece0509edf02b0968b5c8d1081cdafcfba3b7c1599256e6685ef7391f46746eaf829bc8fd40f55be70a3fc51142648b78a903e750158328cb80d54aaddce82df8fe983b0e36af4dafbdbdffe8896bee9a93c370e77f735fe9c42fc2259a3e5672e9f75f37ecf7104e53 firefox.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\3BA63A6E4841355772DEBEF9CDCF4D5AF353A297\Blob = 0f000000010000002000000056b5f0d9db578e3f142921daa387902722a76700375c7e1c4ae0ba004bacaa0c0300000001000000140000003ba63a6e4841355772debef9cdcf4d5af353a2972000000001000000350500003082053130820419a00302010202100aa125d6d6321b7e41e405da3697c215300d06092a864886f70d01010b05003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3136303130373132303030305a170d3331303130373132303030305a3072310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3131302f060355040313284469676943657274205348413220417373757265642049442054696d657374616d70696e6720434130820122300d06092a864886f70d01010105000382010f003082010a0282010100bdd032ee4bcd8f7fdda9ba8299c539542857b6234ac40e07453351107dd0f97d4d687ee7b6a0f48db388e497bf63219098bf13bc57d3c3e17e08d66a140038f72e1e3beecca6f63259fe5f653fe09bebe34647061a557e0b277ec0a2f5a0e0de223f0eff7e95fbf3a3ba223e18ac11e4f099036d3b857c09d3ee5dc89a0b54e3a809716be0cf22100f75cf71724e0aaddf403a5cb751e1a17914c64d2423305dbcec3c606aac2f07ccfdf0ea47d988505efd666e56612729898451e682e74650fd942a2ca7e4753eba980f847f9f3114d6add5f264cb7b1e05d084197217f11706ef3dcdd64def0642fda2532a4f851dc41d3cafcfdaac10f5ddacace956ff930203010001a38201ce308201ca301d0603551d0e04160414f4b6e1201dfe29aed2e461a5b2a225b2c817356e301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f30120603551d130101ff040830060101ff020100300e0603551d0f0101ff04040302018630130603551d25040c300a06082b06010505070308307906082b06010505070101046d306b302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304306082b060105050730028637687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944526f6f7443412e6372743081810603551d1f047a3078303aa038a0368634687474703a2f2f63726c342e64696769636572742e636f6d2f4469676943657274417373757265644944526f6f7443412e63726c303aa038a0368634687474703a2f2f63726c332e64696769636572742e636f6d2f4469676943657274417373757265644944526f6f7443412e63726c30500603551d20044930473038060a6086480186fd6c000204302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f435053300b06096086480186fd6c0701300d06092a864886f70d01010b05000382010100719512e951875669cdefddda7caa637ab378cf06374084ef4b84bfcacf0302fdc5a7c30e20422caf77f32b1f0c215a2ab705341d6aae99f827a266bf09aa60df76a43a930ff8b2d1d87c1962e85e82251ec4ba1c7b2c21e2d65b2c1435430468b2db7502e072c798d63c64e51f4810185f8938614d62462487638c91522caf2989e5781fd60b14a580d7124770b375d59385937eb69267fb536189a8f56b96c0f458690d7cc801b1b92875b7996385228c61ca79947e59fc8c0fe36fb50126b66ca5ee875121e458609bba0c2d2b6da2c47ebbc4252b4702087c49ae13b6e17c424228c61856cf4134b6665db6747bf55633222f2236b24ba24a95d8f5a68e52 firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION" certutil.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\4CE89794FE2D2F7E30121F10BCF76AC3CCF77CA9\Blob = 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 firefox.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\E1D782A8E191BEEF6BCA1691B5AAB494A6249BF3\Blob = 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 certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION" certutil.exe -
Executes dropped EXE 8 IoCs
pid Process 1680 npcap-1.79.exe 5308 NPFInstall.exe 5892 NPFInstall.exe 5028 NPFInstall.exe 228 NPFInstall.exe 5560 SteamSetup.exe 5544 steamservice.exe 5576 steam.exe -
Loads dropped DLL 36 IoCs
pid Process 2200 wireshark-4.5.0-x64.exe 2200 wireshark-4.5.0-x64.exe 2200 wireshark-4.5.0-x64.exe 2200 wireshark-4.5.0-x64.exe 2200 wireshark-4.5.0-x64.exe 2200 wireshark-4.5.0-x64.exe 2200 wireshark-4.5.0-x64.exe 2200 wireshark-4.5.0-x64.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 1680 npcap-1.79.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 1680 npcap-1.79.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -silent" SteamSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 47 yandex.com 72 yandex.com 42 yandex.com 44 yandex.com -
Drops file in System32 directory 34 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{90221744-acba-0f46-9c87-206c4ada3e8e}\npcap.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{90221744-acba-0f46-9c87-206c4ada3e8e}\SET8516.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{90221744-acba-0f46-9c87-206c4ada3e8e}\SET8514.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{90221744-acba-0f46-9c87-206c4ada3e8e}\NPCAP.inf DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netnb.inf_amd64_10acfa4b924dd181\netnb.PNF NPFInstall.exe File created C:\Windows\SysWOW64\Npcap\WlanHelper.exe npcap-1.79.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\npcap.inf_amd64_7e15104413fda30a\npcap.sys DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\wfpcapture.inf_amd64_54cf91ab0e4c9ac2\wfpcapture.PNF NPFInstall.exe File created C:\Windows\system32\Npcap\WlanHelper.exe npcap-1.79.exe File created C:\Windows\system32\Npcap\wpcap.dll npcap-1.79.exe File created C:\Windows\system32\Npcap\Packet.dll npcap-1.79.exe File created C:\Windows\System32\DriverStore\Temp\{90221744-acba-0f46-9c87-206c4ada3e8e}\SET8514.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\ndiscap.inf_amd64_d34968d7b3e6da21\ndiscap.PNF NPFInstall.exe File created C:\Windows\System32\DriverStore\FileRepository\netpacer.inf_amd64_8074ac14f1ab2957\netpacer.PNF NPFInstall.exe File created C:\Windows\SysWOW64\Npcap\wpcap.dll npcap-1.79.exe File created C:\Windows\System32\DriverStore\Temp\{90221744-acba-0f46-9c87-206c4ada3e8e}\SET8515.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{90221744-acba-0f46-9c87-206c4ada3e8e}\SET8516.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\npcap.inf_amd64_7e15104413fda30a\NPCAP.inf DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netbrdg.inf_amd64_3debe5e78bab1bca\netbrdg.PNF NPFInstall.exe File created C:\Windows\System32\DriverStore\FileRepository\c_netservice.inf_amd64_bc519c177a90877a\c_netservice.PNF NPFInstall.exe File created C:\Windows\System32\DriverStore\FileRepository\netserv.inf_amd64_56c163d21e8c2b62\netserv.PNF NPFInstall.exe File created C:\Windows\SysWOW64\Npcap\NpcapHelper.exe npcap-1.79.exe File created C:\Windows\System32\DriverStore\FileRepository\netvwififlt.inf_amd64_882899f2b1006416\netvwififlt.PNF NPFInstall.exe File created C:\Windows\system32\Npcap\NpcapHelper.exe npcap-1.79.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\npcap.inf_amd64_7e15104413fda30a\npcap.cat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{90221744-acba-0f46-9c87-206c4ada3e8e} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netrass.inf_amd64_72f156a5ee3f59e8\netrass.PNF NPFInstall.exe File created C:\Windows\System32\DriverStore\FileRepository\netnwifi.inf_amd64_0525128a3d54207e\netnwifi.PNF NPFInstall.exe File created C:\Windows\SysWOW64\Npcap\Packet.dll npcap-1.79.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{90221744-acba-0f46-9c87-206c4ada3e8e}\npcap.sys DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\npcap.inf_amd64_7e15104413fda30a\npcap.PNF NPFInstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{90221744-acba-0f46-9c87-206c4ada3e8e}\SET8515.tmp DrvInst.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\wireshark\radius\dictionary.nile wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\dtds\reginfo.dtd wireshark-4.5.0-x64.exe File created C:\Program Files (x86)\Steam\package\resources_hidpi_all.zip.vz.3de815c3117712cb9eeb7ea4c8b275faf481dcfd_56342 steam.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-export-selected.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-mate-gop_analysis.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-user-guide-cover.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\libgcc_s_seh-1.dll wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\libgnutls-30.dll wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\ChapterCapture.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.altiga wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\AppMessagesDetails.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\libcrypto-3-x64.dll wireshark-4.5.0-x64.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_greek.txt SteamSetup.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-stats-conversations.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-tel-seq-dialog.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\libexpat-1.dll wireshark-4.5.0-x64.exe File opened for modification C:\Program Files\wireshark\radius\dictionary.bintec wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.rfc4603 wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.aerohive wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\dtds\dc.dtd wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\translations\wireshark_hu.qm wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\plugins\4.5\codecs\opus_dec.dll wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\libfontconfig-1.dll wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.cosine wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\ChUsePacketBytesPaneSection.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\uninstall-wireshark.exe wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.telrad wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\dtds\rlmi.dtd wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\plugins\4.5\epan\irda.dll wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-capture-options.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-pref-name-resolution.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\diameter\sip.xml wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.itk wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.alcatel wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\ChCapPrerequisitesSection.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\ChStatConversations.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.quiconnect wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\ChIOExportSection.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\note.svg wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\related-response.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\diameter\AlcatelLucent.xml wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Qt6Widgets.dll wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\translations\wireshark_sv.qm wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\plugins\4.5\epan\profinet.dll wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\Ch80211Keys.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\ChCustCommandLine.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\ChMateConfigurationExamples.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-packet-format.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\diameter\Telefonica.xml wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\ChStatRSerPool.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\ChWindowsFolder.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-filter-macros.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-pref-appearance-fonts-and-colors.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\libwireshark.dll wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\libpcre2-8-0.dll wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\reordercap.exe wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\ChWirelessWLANTraffic.html wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\Wireshark User's Guide\images\ws-stats-endpoints.png wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\libglib-2.0-0.dll wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.3gpp wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.hillstone wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.netscreen wireshark-4.5.0-x64.exe File created C:\Program Files\wireshark\radius\dictionary.pica8 wireshark-4.5.0-x64.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\INF\oem3.PNF NPFInstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log NPFInstall.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\Downloads\SteamSetup.exe:Zone.Identifier firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npcap-1.79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wireshark-4.5.0-x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SteamSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe -
Checks SCSI registry key(s) 3 TTPs 38 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ NPFInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A NPFInstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ NPFInstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 NPFInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ NPFInstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ NPFInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 NPFInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 NPFInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A NPFInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A NPFInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A NPFInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 NPFInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steamlink\Shell\Open\Command steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.atc\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wpz wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\DefaultIcon\ = "steam.exe" steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steamlink\ = "URL:steamlink protocol" steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.fdc\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tpc\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steamlink\Shell\Open steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.acp wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wpc wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wpc\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steam steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.enc\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.acp\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.out wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pklg\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wireshark-capture-file\Shell\open\command wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pcap\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.scap wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.trace\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steamlink steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.pcapng wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\Software\Classes\steam\Shell\Open\Command steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\ = "URL:steamlink protocol" steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steamlink\URL Protocol steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.5vw wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open\Command steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ems wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.atc wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ipfix\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lcap\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vwr\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\.cap wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\.cap\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.apc wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.apc\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steam\ = "URL:steam protocol" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steam\Shell\Open\Command steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.pcap wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.syc wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.trace wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vwr wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rtp\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\.erf\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink\DefaultIcon steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mplog wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steam\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wireshark-capture-file\DefaultIcon wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steam\DefaultIcon steamservice.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\steam\Shell\Open steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bfr wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tr1\ = "wireshark-capture-file" wireshark-4.5.0-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.trc wireshark-4.5.0-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\URL Protocol steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wireshark-capture-file\ = "Wireshark capture file" wireshark-4.5.0-x64.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 steam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 steam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 steam.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\SteamSetup.exe:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 5308 NPFInstall.exe 5308 NPFInstall.exe 5688 powershell.exe 5688 powershell.exe 5688 powershell.exe 5952 powershell.exe 5952 powershell.exe 5952 powershell.exe 488 powershell.exe 488 powershell.exe 488 powershell.exe 5612 powershell.exe 5612 powershell.exe 5612 powershell.exe 5812 powershell.exe 5812 powershell.exe 5812 powershell.exe 5208 powershell.exe 5208 powershell.exe 5208 powershell.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe 5560 SteamSetup.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 676 Process not Found 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2368 firefox.exe Token: SeDebugPrivilege 2368 firefox.exe Token: SeDebugPrivilege 5308 NPFInstall.exe Token: SeDebugPrivilege 5688 powershell.exe Token: SeDebugPrivilege 5952 powershell.exe Token: SeDebugPrivilege 488 powershell.exe Token: SeDebugPrivilege 5612 powershell.exe Token: SeAuditPrivilege 5432 svchost.exe Token: SeSecurityPrivilege 5432 svchost.exe Token: SeDebugPrivilege 5812 powershell.exe Token: SeDebugPrivilege 5208 powershell.exe Token: SeIncreaseQuotaPrivilege 5208 powershell.exe Token: SeSecurityPrivilege 5208 powershell.exe Token: SeTakeOwnershipPrivilege 5208 powershell.exe Token: SeLoadDriverPrivilege 5208 powershell.exe Token: SeSystemProfilePrivilege 5208 powershell.exe Token: SeSystemtimePrivilege 5208 powershell.exe Token: SeProfSingleProcessPrivilege 5208 powershell.exe Token: SeIncBasePriorityPrivilege 5208 powershell.exe Token: SeCreatePagefilePrivilege 5208 powershell.exe Token: SeBackupPrivilege 5208 powershell.exe Token: SeRestorePrivilege 5208 powershell.exe Token: SeShutdownPrivilege 5208 powershell.exe Token: SeDebugPrivilege 5208 powershell.exe Token: SeSystemEnvironmentPrivilege 5208 powershell.exe Token: SeRemoteShutdownPrivilege 5208 powershell.exe Token: SeUndockPrivilege 5208 powershell.exe Token: SeManageVolumePrivilege 5208 powershell.exe Token: 33 5208 powershell.exe Token: 34 5208 powershell.exe Token: 35 5208 powershell.exe Token: 36 5208 powershell.exe Token: SeIncreaseQuotaPrivilege 5208 powershell.exe Token: SeSecurityPrivilege 5208 powershell.exe Token: SeTakeOwnershipPrivilege 5208 powershell.exe Token: SeLoadDriverPrivilege 5208 powershell.exe Token: SeSystemProfilePrivilege 5208 powershell.exe Token: SeSystemtimePrivilege 5208 powershell.exe Token: SeProfSingleProcessPrivilege 5208 powershell.exe Token: SeIncBasePriorityPrivilege 5208 powershell.exe Token: SeCreatePagefilePrivilege 5208 powershell.exe Token: SeBackupPrivilege 5208 powershell.exe Token: SeRestorePrivilege 5208 powershell.exe Token: SeShutdownPrivilege 5208 powershell.exe Token: SeDebugPrivilege 5208 powershell.exe Token: SeSystemEnvironmentPrivilege 5208 powershell.exe Token: SeRemoteShutdownPrivilege 5208 powershell.exe Token: SeUndockPrivilege 5208 powershell.exe Token: SeManageVolumePrivilege 5208 powershell.exe Token: 33 5208 powershell.exe Token: 34 5208 powershell.exe Token: 35 5208 powershell.exe Token: 36 5208 powershell.exe Token: SeIncreaseQuotaPrivilege 5208 powershell.exe Token: SeSecurityPrivilege 5208 powershell.exe Token: SeTakeOwnershipPrivilege 5208 powershell.exe Token: SeLoadDriverPrivilege 5208 powershell.exe Token: SeSystemProfilePrivilege 5208 powershell.exe Token: SeSystemtimePrivilege 5208 powershell.exe Token: SeProfSingleProcessPrivilege 5208 powershell.exe Token: SeIncBasePriorityPrivilege 5208 powershell.exe Token: SeCreatePagefilePrivilege 5208 powershell.exe Token: SeBackupPrivilege 5208 powershell.exe Token: SeRestorePrivilege 5208 powershell.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 5168 firefox.exe 5168 firefox.exe 5168 firefox.exe 5168 firefox.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 4136 MiniSearchHost.exe 2200 wireshark-4.5.0-x64.exe 2368 firefox.exe 1680 npcap-1.79.exe 5308 NPFInstall.exe 5892 NPFInstall.exe 5028 NPFInstall.exe 228 NPFInstall.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 5560 SteamSetup.exe 5544 steamservice.exe 5168 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 4440 wrote to memory of 2368 4440 firefox.exe 91 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2464 2368 firefox.exe 92 PID 2368 wrote to memory of 2668 2368 firefox.exe 93 PID 2368 wrote to memory of 2668 2368 firefox.exe 93 PID 2368 wrote to memory of 2668 2368 firefox.exe 93 PID 2368 wrote to memory of 2668 2368 firefox.exe 93 PID 2368 wrote to memory of 2668 2368 firefox.exe 93 PID 2368 wrote to memory of 2668 2368 firefox.exe 93 PID 2368 wrote to memory of 2668 2368 firefox.exe 93 PID 2368 wrote to memory of 2668 2368 firefox.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\artifacts.zip1⤵PID:3740
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2064
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4136
-
C:\Users\Admin\AppData\Local\Temp\Temp1_artifacts.zip\build\packaging\nsis\wireshark-4.5.0-x64.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_artifacts.zip\build\packaging\nsis\wireshark-4.5.0-x64.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Program Files\wireshark\npcap-1.79.exe"C:\Program Files\wireshark\npcap-1.79.exe" /winpcap_mode=no /loopback_support=no2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\nsq5CDE.tmp\NPFInstall.exe"C:\Users\Admin\AppData\Local\Temp\nsq5CDE.tmp\NPFInstall.exe" -n -check_dll3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5308
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -NonInteractive -Command "Get-ChildItem Cert:\LocalMachine\Root | Where-Object {$_.Thumbprint -eq '0563b8630d62d75abbc8ab1e4bdfb5a899b24d43'} | Sort-Object -Descending -Property FriendlyName | Select-Object -Skip 1 | Remove-Item"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5688
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -NonInteractive -Command "If (Get-ChildItem Cert:\LocalMachine\Root\0563b8630d62d75abbc8ab1e4bdfb5a899b24d43){certutil.exe -verifystore 'Root' '0563b8630d62d75abbc8ab1e4bdfb5a899b24d43';If($LASTEXITCODE -ne 0){Remove-Item Cert:\LocalMachine\Root\0563b8630d62d75abbc8ab1e4bdfb5a899b24d43}}"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5952 -
C:\Windows\SysWOW64\certutil.exe"C:\Windows\system32\certutil.exe" -verifystore Root 0563b8630d62d75abbc8ab1e4bdfb5a899b24d434⤵
- Manipulates Digital Signatures
- System Location Discovery: System Language Discovery
PID:6100
-
-
-
C:\Windows\SysWOW64\certutil.execertutil.exe -verifystore "Root" "0563b8630d62d75abbc8ab1e4bdfb5a899b24d43"3⤵
- System Location Discovery: System Language Discovery
PID:6112
-
-
C:\Windows\SysWOW64\certutil.execertutil.exe -addstore -f "Root" "C:\Users\Admin\AppData\Local\Temp\nsq5CDE.tmp\0563b8630d62d75abbc8ab1e4bdfb5a899b24d43.sst"3⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -NonInteractive -Command "Get-ChildItem Cert:\LocalMachine\Root | Where-Object {$_.Thumbprint -eq '5fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25'} | Sort-Object -Descending -Property FriendlyName | Select-Object -Skip 1 | Remove-Item"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:488
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -NonInteractive -Command "If (Get-ChildItem Cert:\LocalMachine\Root\5fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25){certutil.exe -verifystore 'Root' '5fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25';If($LASTEXITCODE -ne 0){Remove-Item Cert:\LocalMachine\Root\5fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25}}"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5612 -
C:\Windows\SysWOW64\certutil.exe"C:\Windows\system32\certutil.exe" -verifystore Root 5fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc254⤵
- System Location Discovery: System Language Discovery
PID:5472
-
-
-
C:\Windows\SysWOW64\certutil.execertutil.exe -verifystore "Root" "5fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25"3⤵
- System Location Discovery: System Language Discovery
PID:5580
-
-
C:\Windows\SysWOW64\certutil.execertutil.exe -addstore -f "Root" "C:\Users\Admin\AppData\Local\Temp\nsq5CDE.tmp\5fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25.sst"3⤵
- System Location Discovery: System Language Discovery
PID:5628
-
-
C:\Windows\SysWOW64\certutil.execertutil.exe -addstore -f "TrustedPublisher" "C:\Users\Admin\AppData\Local\Temp\nsq5CDE.tmp\signing.p7b"3⤵
- Manipulates Digital Signatures
- System Location Discovery: System Language Discovery
PID:5820
-
-
C:\Program Files\Npcap\NPFInstall.exe"C:\Program Files\Npcap\NPFInstall.exe" -n -c3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5892 -
C:\Windows\SYSTEM32\pnputil.exepnputil.exe -e4⤵PID:5880
-
-
-
C:\Program Files\Npcap\NPFInstall.exe"C:\Program Files\Npcap\NPFInstall.exe" -n -iw3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5028
-
-
C:\Program Files\Npcap\NPFInstall.exe"C:\Program Files\Npcap\NPFInstall.exe" -n -i3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -NonInteractive -Command "Microsoft.PowerShell.Management\Start-Service -Name npcap -PassThru | Microsoft.PowerShell.Management\Stop-Service -PassThru | Microsoft.PowerShell.Management\Start-Service"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5812
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -NonInteractive -Command "ScheduledTasks\Register-ScheduledTask -Force -TaskName 'npcapwatchdog' -Description 'Ensure Npcap service is configured to start at boot' -Action (ScheduledTasks\New-ScheduledTaskAction -Execute 'C:\Program Files\Npcap\CheckStatus.bat') -Principal (ScheduledTasks\New-ScheduledTaskPrincipal -UserId 'SYSTEM' -LogonType ServiceAccount) -Trigger (ScheduledTasks\New-ScheduledTaskTrigger -AtStartup) -Settings (ScheduledTasks\New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Compatibility Win8)"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Manipulates Digital Signatures
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1956 -parentBuildID 20240401114208 -prefsHandle 1872 -prefMapHandle 1864 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {965f223e-2db0-4aeb-9c2b-1fdd4aeb98bc} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" gpu3⤵PID:2464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2376 -parentBuildID 20240401114208 -prefsHandle 2368 -prefMapHandle 2364 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82364828-16e5-4df5-934a-26eb83a24ff5} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" socket3⤵
- Checks processor information in registry
PID:2668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3100 -childID 1 -isForBrowser -prefsHandle 3080 -prefMapHandle 3060 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {277d3356-32b7-4f5e-a2bb-c9ac0135f2a2} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab3⤵PID:2932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2708 -childID 2 -isForBrowser -prefsHandle 3692 -prefMapHandle 3100 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc6f1ace-5cf8-48b6-9bef-fb3321d700bd} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab3⤵PID:3588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4700 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4632 -prefMapHandle 4712 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bef0a0a3-7c05-40e6-8968-cda3c2e7f1fb} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" utility3⤵
- Checks processor information in registry
PID:4980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5392 -childID 3 -isForBrowser -prefsHandle 1332 -prefMapHandle 1676 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e7d2bf8-fb20-4dc0-8006-701b70fb9d08} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab3⤵PID:4628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1680 -childID 4 -isForBrowser -prefsHandle 2796 -prefMapHandle 2792 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9a8adea-1221-47b1-9bfe-d8d5e0228d2c} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab3⤵PID:1568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 5 -isForBrowser -prefsHandle 5792 -prefMapHandle 5796 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06b97b83-2e3c-417c-b5e8-ae74b5ede740} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab3⤵PID:3980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6152 -childID 6 -isForBrowser -prefsHandle 6088 -prefMapHandle 6092 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {69bd25b2-94db-4dd4-8225-8edb29f18c72} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab3⤵PID:4532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5516 -childID 7 -isForBrowser -prefsHandle 1404 -prefMapHandle 5552 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04d1395a-8e19-4e4b-bef3-968392a5ee05} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab3⤵PID:3972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4320 -childID 8 -isForBrowser -prefsHandle 3948 -prefMapHandle 5268 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d7f6676-0a7d-4ffd-ab0c-0c0ae730447b} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab3⤵PID:4456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5700 -parentBuildID 20240401114208 -prefsHandle 5980 -prefMapHandle 5976 -prefsLen 29397 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2edaf155-5467-4b6a-a2fd-03d0e89572a1} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" rdd3⤵PID:5296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6728 -childID 9 -isForBrowser -prefsHandle 6740 -prefMapHandle 6736 -prefsLen 27253 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b1c601e-6b43-4312-a620-1652b43c5e48} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab3⤵PID:5712
-
-
C:\Users\Admin\Downloads\SteamSetup.exe"C:\Users\Admin\Downloads\SteamSetup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5560 -
C:\Program Files (x86)\Steam\bin\steamservice.exe"C:\Program Files (x86)\Steam\bin\steamservice.exe" /Install4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5544
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:5432 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{9712ce58-344c-634f-b574-f3562eb8203f}\NPCAP.inf" "9" "405306be3" "000000000000015C" "WinSta0\Default" "000000000000016C" "208" "C:\Program Files\Npcap"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:5608
-
-
C:\Program Files (x86)\Steam\steam.exe"C:\Program Files (x86)\Steam\steam.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
PID:5576
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:1628
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5168 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1840 -parentBuildID 20240401114208 -prefsHandle 1756 -prefMapHandle 1748 -prefsLen 24418 -prefMapSize 245021 -appDir "C:\Program Files\Mozilla Firefox\browser" - {97c654ab-df16-49ed-a38f-a898725aea8a} 5168 "\\.\pipe\gecko-crash-server-pipe.5168" gpu3⤵PID:2904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2180 -parentBuildID 20240401114208 -prefsHandle 2172 -prefMapHandle 2168 -prefsLen 24418 -prefMapSize 245021 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cadeec81-3f6c-49a3-8e38-6fc29cbb45fd} 5168 "\\.\pipe\gecko-crash-server-pipe.5168" socket3⤵PID:6112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2428 -childID 1 -isForBrowser -prefsHandle 2904 -prefMapHandle 3116 -prefsLen 24917 -prefMapSize 245021 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {862c80c2-bedf-48bd-80e4-c92383417a5e} 5168 "\\.\pipe\gecko-crash-server-pipe.5168" tab3⤵PID:4636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3788 -childID 2 -isForBrowser -prefsHandle 3776 -prefMapHandle 3768 -prefsLen 30150 -prefMapSize 245021 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {854dcb3a-b9cf-4269-ad51-51dfe981c4f6} 5168 "\\.\pipe\gecko-crash-server-pipe.5168" tab3⤵PID:4120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4572 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4564 -prefMapHandle 4496 -prefsLen 30204 -prefMapSize 245021 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f7bda0b-a57f-436f-b312-e3413e945ba5} 5168 "\\.\pipe\gecko-crash-server-pipe.5168" utility3⤵PID:5448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4544 -childID 3 -isForBrowser -prefsHandle 5044 -prefMapHandle 4996 -prefsLen 27721 -prefMapSize 245021 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7625d62c-b5e3-436f-b4a2-4cb5db7b52d5} 5168 "\\.\pipe\gecko-crash-server-pipe.5168" tab3⤵PID:1988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5180 -childID 4 -isForBrowser -prefsHandle 5188 -prefMapHandle 5192 -prefsLen 27721 -prefMapSize 245021 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {60dd9366-6f3d-41e2-9bb7-76ed0807b288} 5168 "\\.\pipe\gecko-crash-server-pipe.5168" tab3⤵PID:4588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 5 -isForBrowser -prefsHandle 5380 -prefMapHandle 5384 -prefsLen 27721 -prefMapSize 245021 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52d1e621-9870-4cae-b020-5f4ce19c7c46} 5168 "\\.\pipe\gecko-crash-server-pipe.5168" tab3⤵PID:5148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6032 -childID 6 -isForBrowser -prefsHandle 6016 -prefMapHandle 6020 -prefsLen 27721 -prefMapSize 245021 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff3d7368-4600-4b28-9f68-ec83b70dbd8a} 5168 "\\.\pipe\gecko-crash-server-pipe.5168" tab3⤵PID:3176
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
3Install Root Certificate
1SIP and Trust Provider Hijacking
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5851cc374a87e0a83956a29c762c008c5
SHA11f1c907e687631c551caaaffb0de28dfcfb03c01
SHA256f05d0dfba14aceb7cb27b49ec8c4f1ce179813e0cf89a32855d7ea2fda91e124
SHA512260c822dbb2fd53cec2ad352e97a42a665fc030de9cf0b223fed3a945822ccbd7e0e12fa0873646aaf38f5f7b93428f29c0bed3709fbaaa83a3dab6dc39a2dc7
-
Filesize
68KB
MD51637086aa0ba4637d2788dc20a0cc67c
SHA14628fe7561526714361764ec637339b21ea88b60
SHA256734c62543768e37c36386b4a07582bb5b322a60d5c997626465725c5b5cef978
SHA51292fb3dd73873ef8a888823f14911f52fe7c11a06bf4172929783a3f3106ea6298d660389cfca902153424b8df64fbe9dc9c5651228d5eb72a650655df21f7cdc
-
Filesize
4.2MB
MD533bcb1c8975a4063a134a72803e0ca16
SHA1ed7a4e6e66511bb8b3e32cbfb5557ebcb4082b65
SHA25612222b0908eb69581985f7e04aa6240e928fb08aa5a3ec36acae3440633c9eb1
SHA51213f3a7d6215bb4837ea0a1a9c5ba06a985e0c80979c25cfb526a390d71a15d1737c0290a899f4705c2749982c9f6c9007c1751fef1a97b12db529b2f33c97b49
-
Filesize
8KB
MD5ed7304fce3f5e3de28435d3f9e8b4156
SHA145bc86c10386c9368ac482f341999a289dd46897
SHA25664be5edac3eba224120138c6dea3e4a75740e23324fba5a0799499402d96a258
SHA512d7532a12b726869e430745da536b7e1e85ce5871bbf3c3cf5fb4261f5b3d5d4307e6267a8b5f53a6719369e261c66c85c05f3941974594ae4864b16242cae41b
-
Filesize
2KB
MD58ca4504e8e9b66d925107a8f13d9babb
SHA1a1d34e2a6e9ce395da0702a9b1e1ec815dc144f0
SHA256d1b2726787010252e4dec2a1a47fdd42d86b917c9c41f8baab2219de938b90cb
SHA5124c3fe98134c6e7c180829f82374b22ab052e1cadd2d2ff71ff6eefa4e2a7ff21b8bff14ff21677099d2656a0c216c40abb9246860e70be9f254d73d58b624c38
-
Filesize
1KB
MD5ce2e063c5e272a8699eec1a08a681103
SHA139566e10005a6733bc380f5ccd29c5b39e994233
SHA25690bc8e312194b29181db9a78efc522972359b5b2c522e425c34b789f5d00dad3
SHA512838962bb84b485cdc64451336771156d6e1d552a7a29b84acf3aa1719b6a04e1c65e2983ed7264d1f47913553b1724cb2c4f8f805fd276a9ff164d86c48220d5
-
Filesize
2KB
MD59ceb07770b97e687994c1f9c71af6cb8
SHA1f1be2c32f4d750ff9ceefa507e4a0a7d3df644f7
SHA256c797c68a4f765008a685ad2841f2b08a33293ae6d94b61511696665def9aa1e5
SHA5123d202a2099f8a2b80d8156c33ce5949ff5604873d050b958c648d4d1b85df49ac90b6c98ab9d1a870c1ed0355cd00329e625005bad8ad2395e794252820ecd7a
-
Filesize
3KB
MD5f45a33814aeaafb46462b71ab7075361
SHA1cbc59a14235f7aeb4df393b64d4058698f9a5b47
SHA25628286f473186c1c191b571699bec115cc77bb81952ab46dbaeae08e7369b8e25
SHA512517b7110ab7da92b6806769e1d6b4dd8aa99f2df734342ab839307b53482f879d77f4130928808e613698cab540679bc4246caf105aaf3a13170e623b642887c
-
Filesize
4KB
MD567fc09882f6c608c5bb2850bc0f27b32
SHA170cefe8ab831bd9f1370093cbad7d7fbaf2707cf
SHA256cbef8736de2f39fefca1267f0efac62e955a6aaf080449720b21bd9d16a7d9fd
SHA512882b16dd0539299b91c8318f90fcd8e5e4a0d4e5a215b30533dfe12ef207782080a53596e2f8af4eb3770fd119386080586a5697ff96e907e079b444e16f0967
-
Filesize
4KB
MD5c40a85f3975b853ed4a3f56a9f510fc0
SHA1ba8e22270d84b45b5babecfff0cfc84017b83409
SHA256fbdb12fa1d87f08f444fd5c00f6697d7b0f5b954b10dd54c0e05decbca441998
SHA5121151bf1d1fc2b8e8b66f5fc8255e99ec4553dbd2d4d03a330175355c31a93504f484fa4f08848bf691bffa4a8e8f2bdf020ad37ec4ae6ce251d301c27d6df9e8
-
Filesize
1.1MB
MD5a4d7e47df742f62080bf845d606045b4
SHA1723743dc9fa4a190452a7ffc971adfaac91606fa
SHA256a95577ebbc67fc45b319e2ef3a55f4e9b211fe82ed4cb9d8be6b1a9e2425ce53
SHA5128582b51b5fea23de43803fa925d13f1eb6d91b708be133be745d7d6155082cd131c9b62dc6a08b77f419a239efe6eb55a98f02f5783c7cd46e284ec3241fc2ee
-
Filesize
2KB
MD508a41b2a5cba04117cc86ac7628814fd
SHA127ef154216bc996c5d6726072715f176ac349fc5
SHA2568f2c523d6b851d6a91ebad962f18f005e8ab564efc5a2c3325a2d7ddd469f0a0
SHA512df9d99b0cd8de5b2da7c74520c66a35acfa0dbf6fe927e3146a63d52c0808792a1cb56c36645810a4eccf3ada536f931e0e4b5e1472c01a709fda4d3eafb53e7
-
Filesize
17KB
MD5a4a915ca0c7b72e215293d4fea352222
SHA1f0722e80411fb5149245d547dbd643ad68cdc51d
SHA256c909f83e04449015df940a1f43613f7dae9a1c95798179938c3f803a5ea5a756
SHA51247bfee279e878951124214dc53e920617b3f33315fef41e628f95b2f1367fbb23dc31cc6c71447b4fcb4e382befacaee840d6eb7df1a052da75cd795706161d2
-
Filesize
16KB
MD5380350013cc1e248b31ff8b1c6179c2f
SHA16df44e945b6fdb4e07a10e0f295c577c347d75d6
SHA2567204ff2231d5d7c08c2ebd9e69d89817fe61679776cc07820f67b85ae0c9f6e8
SHA512ed8bef1bc839370c3f5ac42ccf9900404c8fd48c507707cfaabbf101619c719d6b1f991a490036ad999b60cadfd243e7175fd99c272d99ab57168056ce4831e9
-
Filesize
17KB
MD567eef6b88c3edf39270c388f14b1048b
SHA1b4808270b05b7b64ef5aae3502eae65824fef2a8
SHA256e9763662e69d7d8d695f21eda8eed3be05d98bd0f147765e8b6104850f72e429
SHA51210c9facf7ca40af73db537961868e186e6e236a05039a98a65666e96d02c1ffd11698f1c1a340bcdc9e85e8cd859bac1afb508b8e9e9019e3dbd47cc5c12bf2c
-
Filesize
16KB
MD5b34914b6a8358ed742dea55e7fce98fc
SHA197bf17527f744818f2316e9ae919b18d80eb18da
SHA256a9fad8fedd512551fe9f386502cf28a18210f4a9c8ac289c5d846bc40568505f
SHA512f81e1ff12986fd1d423f792ba54e7809ea263ea43b665e83424969244bde288dc4144cbdb0823c8a5ee7f890d84e35e5a9faf224be618c2829ac4ce1a184b28e
-
Filesize
17KB
MD535205e8f661ad53c94143d9daae82258
SHA163d01b78081d880bdd20c134a27e46d907bd718a
SHA2565110f85e98b0e45fca63269d7d27c660e553e53aaa97d3de69a8103de502088a
SHA512265aaa942c5c756335ef32e726abcd26b53615d57eab70293e538664536c0c0a2a21ab958f3be044aaef0d09ddbfa7bca5cd8caa5a39f2e13bf366b0c5c10e94
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\activity-stream.discovery_stream.json
Filesize39KB
MD5009a6ffc352168eb6b7a7a9e242683af
SHA112f9ee1b75c4c0016cae5cf5c348baea05ae9a48
SHA256547d86f33991bc782fdaa7b1a6a9c379869c9e124591f1e1c6cdfe181419155a
SHA51208dba4416fb40c6a4348d554f20ea786888cea1e0d61e70deaefccd6a68286baddf529c06153e5fb77a2b28f762f357b63bce47bc5109067b21d9e80a7893157
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\cache2\entries\80E40493E66F98650D12C73CDEFE29BBACA89328
Filesize221KB
MD51e7299602cc561e7b9c1f0c31c18bfd5
SHA1eeadfddb15f09843eb95d554a2cc25233f1d911e
SHA2561bf97a0dc28edd1e177322df234222147cca95af9df543b58f8c91c8f24623ce
SHA512a1c348104f0d2564e89cda7e92f3edf5a6af09d92fbdfb0b5287e61c759ffef5604f09bb535bdb128a3c5e32e491c3fefa28a819e9056ce58d625bc70a24fe94
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD573d02317b2b7d017f87018d339285dd2
SHA1339619661d973afcffcabcb82bfd1f7e524c7e50
SHA2560da2a4186eedd502d6d85affc840182f740e9a78bcb972b9cd9d21927275a4a2
SHA5128abdfc53336aaa05d25205b543320b4e1bfc56bc5a41249d82707091d2a3c0a89d0823e771608dba8ef92bb469daea3b1250dcaf1857aa9a67c01c983424f4a6
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5a7f391566ceb7d310b04c1376aa66a07
SHA1eda88e9134d3de209152481c9e8aa02054d4c2eb
SHA2568ecb81fa22792fa6bb09abc86b9b5afb50773e2c5537def45dd8ba297f6c714e
SHA512163bad20eaa9108286367367e6a54a9ac612026954ee2466b8f88f732a992695fe160d3fb5f092976ef15c1c1b71400e577a9a4833dfa616d7c9ee6a8237033c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
866B
MD5f3c219a45fcb3618123ef6ee2de5a13f
SHA15c6ddf04c2d26c7b433b9db1d1157a7a199fc34c
SHA256ca57ab9315d0b9209f4f50f553d4aa2bb0c28cbcbbff24c338b879674e0c311d
SHA512ea0a8c11ae1190780b0a48730e286bfaa215c16204f3a3d946070510e9e6fc9f040e74c3e131c471503dc8716290c4f32b08b040c479be8509bcae3987ea9d39
-
Filesize
32KB
MD5bef770535d2b98e4f24486a5292b16f0
SHA19107f8a6fa3cf0dc2b57e6c97c34c2aa7aaf54a6
SHA25637a4507cff4d8e1ffd01fbab23661cc28a6c024977ea912ce2f49419049d0bf2
SHA512faca2009e37eaf28a39f47c95b63892972583d79ed3d320d2ad81a4862371e0af0237a5675b5e66b10275692128ac488f8255d81b022fbe5dc825c42a5e9537d
-
Filesize
2KB
MD537770b23488380d4f8cdd4672e02d7b2
SHA1489ca0f8323f023680a6bb3aa884e358e1d8d213
SHA2567393a6dd3fd1d45433ded29c3697f3672702b86774a634a7067e99d47ded082e
SHA512322ac98d16a627f78b9735e541fea23202618e86eafce9600eac1cb5a35f3687ff8c3e2632e733e04b45dfa6d259849543bc6560fad21c510f3e611a44ba98ac
-
Filesize
2KB
MD5eab8bcb16963e82aabced55e12700034
SHA174e52ba9decb30f105ed6edfd385bdad2ef864fa
SHA25639d03acf6c14c6c467f12f6d48f38b9550f54bb612085d7c899524329eabf255
SHA5127c9ed1f777f74858cd79679eb635a1add38115efc04e90dd0f279de09d66b45946b015afdbf1452a9d5279e9902b208c2b7841baaabd74e8942f1ce7bf46328a
-
Filesize
2KB
MD505b3a50c4b7230582fb8f0b21c507b26
SHA1983d88730a6b43e69a32ab91a1c495aae3690c58
SHA256de67dcee3accc14461febae1a66d8791a7c5325532ad22725fa9d86fe018da70
SHA5122001331eac256c5518b081d720c3a5a79d36bc12b5aff57db32760c4375875f109d6947881246b6dcd18aa1b242fb962344b9e6885951891db878063c37fd662
-
Filesize
29KB
MD5223b9d97f9bc580f7da1817ebf359223
SHA1091ff63c957787916d1aed9f358b4e921d5312b3
SHA256c90fea5a7efc0a4de0d37bd56b8552a42da2000ef7dc8e8487914c26117b232a
SHA512f79a8e6448ef94f37075612e086b70847c4f59524773a8370cb4361cebf4537dbe0c8cb981f5247682a9fc89af147360e76f386d0d9825dc20d58bca7f0d7158
-
Filesize
2KB
MD5686a9d42c9e3e057e7b1c9417c365569
SHA1d9b6f98a89a1bf172c175ef1898b040d83d8454e
SHA256153786695f9b3eb696f287564a04ae125ac4c9845af908fecf46d5f3a9754084
SHA51275d4f85be3dce14b54d3f29e9ec18342273463061956f7f29df339df56191c075669136f691bba3ae5000d4429a70eacfc7e398863027b85bb4157bc3ea368d6
-
Filesize
14KB
MD5c133aca05825e450a97e1cb474c80964
SHA185ac1b4250993c54c852af1eab1f05e9fcd6b327
SHA2567a7d812895c6c47474217f248d59464eb2a5f163599adf50595536bb9f41339e
SHA512e752b04a9a68b252c153dc128b111d555b8d2d33f639f0445ebc7bcfd8e741730bc7f02a38c96cb4516cd8944c038c74fead3000f3b7daff57742a394dcb36bb
-
Filesize
110KB
MD5db11ab4828b429a987e7682e495c1810
SHA129c2c2069c4975c90789dc6d3677b4b650196561
SHA256c602c44a4d4088dbf5a659f36ba1c3a9d81f8367577de0cb940c0b8afee5c376
SHA512460d1ccfc0d7180eae4e6f1a326d175fec78a7d6014447a9a79b6df501fa05cd4bd90f8f7a85b7b6a4610e2fa7059e30ae6e17bc828d370e5750de9b40b9ae88
-
Filesize
22KB
MD5a36fbe922ffac9cd85a845d7a813f391
SHA1f656a613a723cc1b449034d73551b4fcdf0dcf1a
SHA256fa367ae36bfbe7c989c24c7abbb13482fc20bc35e7812dc377aa1c281ee14cc0
SHA5121d1b95a285536ddc2a89a9b3be4bb5151b1d4c018ea8e521de838498f62e8f29bb7b3b0250df73e327e8e65e2c80b4a2d9a781276bf2a51d10e7099bacb2e50b
-
Filesize
150KB
MD53614a4be6b610f1daf6c801574f161fe
SHA16edee98c0084a94caa1fe0124b4c19f42b4e7de6
SHA25616e0edc9f47e6e95a9bcad15adbdc46be774fbcd045dd526fc16fc38fdc8d49b
SHA51206e0eff28dfd9a428b31147b242f989ce3e92474a3f391ba62ac8d0d05f1a48f4cf82fd27171658acbd667eaffb94cb4e1baf17040dc3b6e8b27f39b843ca281
-
Filesize
20KB
MD54e5bc4458afa770636f2806ee0a1e999
SHA176dcc64af867526f776ab9225e7f4fe076487765
SHA25691a484dc79be64dd11bf5acb62c893e57505fcd8809483aa92b04f10d81f9de0
SHA512b6f529073a943bddbcb30a57d62216c78fcc9a09424b51ac0824ebfb9cac6cae4211bda26522d6923bd228f244ed8c41656c38284c71867f65d425727dd70162
-
Filesize
17KB
MD52095af18c696968208315d4328a2b7fe
SHA1b1b0e70c03724b2941e92c5098cc1fc0f2b51568
SHA2563e2399ae5ce16dd69f7e2c71d928cf54a1024afced8155f1fd663a3e123d9226
SHA51260105dfb1cd60b4048bd7b367969f36ed6bd29f92488ba8cfa862e31942fd529cbc58e8b0c738d91d8bef07c5902ce334e36c66eae1bfe104b44a159b5615ae5
-
Filesize
15KB
MD508072dc900ca0626e8c079b2c5bcfcf3
SHA135f2bfa0b1b2a65b9475fb91af31f7b02aee4e37
SHA256bb6ce83ddaad4f530a66a1048fac868dfc3b86f5e7b8e240d84d1633e385aee8
SHA5128981da7f225eb78c414e9fb3c63af0c4daae4a78b4f3033df11cce43c3a22fdbf3853425fe3024f68c73d57ffb128cba4d0db63eda1402212d1c7e0ac022353c
-
Filesize
1KB
MD5de825a838e33ccf3d06b82de337c06d8
SHA168956e777f646361eae3f06ce6899cd48bb9f593
SHA2563b63b09dff7e4c5fe7ccafff74d9f845d1eb04809b0b77a536b2e4aa7dd1097e
SHA512e935ef759abfcafa4d9cf70a1c5508179600fc85d237e53d3e7f2683fa2e14859e5eee167007328995606996a19f4fcc0c1f9a851011a6fa8db6b53c68160a12
-
Filesize
1KB
MD5a52f3195b5585e1d9a9b38fef66a1801
SHA1986a5f05ff51d261fe595f0ab56598658aadc9c9
SHA25640795f603b2eab75fbd886715b0103f2f362494576400ae88925ed1ba7063bdc
SHA512e9eeb34c3667e56c425b91890f463b5d80e4e5e9f485c2bd3ac064e1784ad118c1460af461e5af8acbbb3bc02432e4f914e54e41d2bdaeaa8af528f0e669b64a
-
Filesize
22KB
MD5170c17ac80215d0a377b42557252ae10
SHA14cbab6cc189d02170dd3ba7c25aa492031679411
SHA25661ea114d9d0cd1e884535095aa3527a6c28df55a4ecee733c8c398f50b84cc3d
SHA5120fd65cad0fcaa98083c2021de3d6429e79978658809c62ae9e4ed630c016915ced36aa52f2f692986c3b600c92325e79fd6d757634e8e02d5e582ff03679163f
-
Filesize
300KB
MD5c01beb6c3526554ec9dfad40502317f2
SHA189f468496bd7e6d993a032f918c5baabb21c11be
SHA2565d54a5e7230baf2b80689ee49d263612a6011bc46ec52843e7b4297e9656d32d
SHA512a7fdb3d69cc2b12c9795c8f5e34f64014273e471dc0639ff4693f18e3d5ea758f38f58a5dfc4d1800511ce3e130a7454fd371579e31dbba049770fb74b889339
-
Filesize
19KB
MD5f020a8d9ede1fb2af3651ad6e0ac9cb1
SHA1341f9345d669432b2a51d107cbd101e8b82e37b1
SHA2567efe73a8d32ed1b01727ad4579e9eec49c9309f2cb7bf03c8afa80d70242d1c0
SHA512408fa5a797d3ff4b917bb4107771687004ba507a33cb5944b1cc3155e0372cb3e04a147f73852b9134f138ff709af3b0fb493cd8fa816c59e9f3d9b5649c68c4
-
Filesize
568B
MD5cae757421db8d011e41266bfd9439885
SHA17108a9f0740ee4e3a118f6ac9212e0446f074181
SHA256ff350a68202aadb145f590c8579f9284d2e3c324b0369fde39e5a3a31d7b8204
SHA512785d19c796834065c823a7da99036378bba54b932ea1e47d4ba0c1d123a0a09ec307a3459fb862221de74ce61d9a8d7ec73901c9de007d31e7b39eb7a19b16b5
-
Filesize
14KB
MD5f9e61a25016dcb49867477c1e71a704e
SHA1c01dc1fa7475e4812d158d6c00533410c597b5d9
SHA256274e53dc8c5ddc273a6f5683b71b882ef8917029e2eaf6c8dbee0c62d999225d
SHA512b4a6289ef9e761e29dd5362fecb1707c97d7cb3e160f4180036a96f2f904b2c64a075b5bf0fea4a3bb94dea97f3cfa0d057d3d6865c68da65fdcb9c3070c33d8
-
Filesize
2KB
MD5d5b270807bd5e8e117db66010fd51afa
SHA14ef5f4835c4db596cc641d2de63187de8ee5c6b3
SHA2565a5e297948d13919e4432a5f7544da14de5accbe6d228f32162669148853edf5
SHA512ee06c81076891a0716cba6f4696a6c7e8033322e6a3378a9e41cef0f3baa9483898df7bd0058da6faf857660d1a5e36ba5ccb6f55e6648ca6450420eb595fca6
-
Filesize
2KB
MD53adb4eaa905fb2a6ec877e1fbcab5688
SHA110bbe89f010262e4f8c6a405075f8b694bdd2f72
SHA256fc1e8703ddb46f35f48f592d026e3fdff9bd753ffb57d46f74d917da93990892
SHA512fa5832d84c79b043ab44f4934b1cc8be605f5a09803c6464095ee54b212a522095d9515d7904c22c59b7178fd36562e6c9d404ba94448caaee7613a686b730b0
-
Filesize
2KB
MD53986168f4cb431761a88c380c06d0fd7
SHA1d413c585524b0483adbb807b05680eee5c6100dd
SHA256a424f3b999f4fcc42c35f51f195b47e59c4015e5625adc1ecf4c2642e6aba111
SHA512d01f6d535b5b67d7dc2a9a9d55e1030b5b18572280c05f7917dd052bb92db4f94ebbc5a07a0cfac3b8ebafaf925bd75b193eb9ca9ce358ec2dd4ffd98aec1257
-
Filesize
7KB
MD5dd4bc901ef817319791337fb345932e8
SHA1f8a3454a09d90a09273935020c1418fdb7b7eb7c
SHA2568e681692403c0f7c0b24160f4642daa1eb080ce5ec754b6f47cc56b43e731b71
SHA5120a67cc346f9752e1c868b7dc60b25704255ab1e6ea745850c069212f2724eba62ffaaa48309d5eba6ae0235223518610fb4b60fc422e4babba4f33d331c71db5
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\AlternateServices.bin
Filesize12KB
MD568348cef6b2a4c33fb2c596506253797
SHA1eed306c7aff2b5c3272bba0756a1fe79e637d720
SHA2566deb81fa360a8e24f7cc9daee9de4ce19c2eba2a554f9b42c26983517b266660
SHA512ee0d5cd4a8571a05c1c672d4a1d5cbb99111bbcd31223bcaf1f2ce60dcc7aae1036cc65ab68a65f2b75d24798e64fe0bee59c8cba5839eb240d7fcbcbc9acc75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\AlternateServices.bin
Filesize12KB
MD583480739f967b0e90bb3634ea628acfc
SHA1fb74fe27acec80a8184490298ffd9dd304ec695f
SHA2565b336b81df91168f8d23956cdfb1ddb1ad1dcc5ef988d3ab746af8e88b08ae4d
SHA51265b14c2517277199ac1da20db3e11a874be24d479f4fb6d09dca14d6ac77d2f05a9d168379c59a0df3558bdcc3378ad2ac5d80770915488d3c725a804e6ad965
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\AlternateServices.bin
Filesize8KB
MD5156a088673b239d3989b61a7474afe9d
SHA1b3a8f121454a8ae5e5645f79004a71f1e4b65e1a
SHA25686783a64b59464bc6c53fa93da89bc97553b9593e6287f2fc65cb411056ec5d9
SHA51255b6f07e3dfc88cd57461e095c941dd49eb97da59a864db4ff1c72fac67a2fcb4f1f7c98d34c77218d7694f274ed6f4d454e4dc21a1fac0b49efb587aee34ab1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD50e74cc315a769bafcc855da5331eb83f
SHA174b5ae2f9e686fc4cb030a04340e35375e3ee5f3
SHA256b4b8f7d41468a83b101a2bce21840f1b752f78b9b8e3f95bdd0c4f3231976945
SHA51285a167cd49e56733102a948d57fca1e0fded6624cd0662b0f2f8ed0cb62f509ae1052982ba2ad940328217fa9a86498e8fe0a767d5e456d29872d92d3d9653f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD535df5896460e2132968b93cd452c2564
SHA1146e258eaf395ef38ecb016c7b2bfd432e279e45
SHA256da9055a4d39a1e4b39b0af71a9c8369d8a0b90d5ee9c996d62e3639971b1c892
SHA512cb4cf70203805d7201aa3886ba36aa594c806aecc94e64b6a049bbdd2bd2471e2dc4ec32dae611679018d2ba3f6155af0b6464d1aaaccb435e20274b0316a207
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5470616fdfa4ae83daed1084c40354ca4
SHA12424bd9577984d17c4fecadbaf77d06c909394cb
SHA2566101e79b4890e1aca54eee8e6a70f889aa0e64da49762b526914d40eb6e16980
SHA512e5bf5ca16dd71eee052c7ac1d5452c4618f37769577a2c99fb152e7a4ffb4a7ea4146ab31b94f749e72185bf71f9b17de3f7c78700b944ab753a37e5a187018c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD51e16709c86081315c5a428118d43aa5d
SHA1bae5fdf924bfeea2a4ca4bd47ebc7bc902f9c5b3
SHA256ef67f558396bb10255a77956400fddae28e3f861cbc39c2c31378484f3662063
SHA5120d2b27c48905030e4f0a8e78e3f9368974256f6bf608194f78cc099174d6110e38f18cb5196a527bf7bb2cf88e9c28f7c78e39d562ee3b072c769032e67ebb14
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ef23247b52dd3188feb92e39e321e1b3
SHA1ced4585f0cf7a8b7c4edc15a6e5f5256bff7927d
SHA2561155ac102c49e071d4cded7b34e049314181fdcf3752a467887d61f43d253f2d
SHA5123f7b650df0a173c8f145a8edca0fd3e381c2a9565483a56c7a959e533d27c23b2ab7b92aa1c43e6e714cce2a77f4e00a700278df99f1ed1360e60f67853e3535
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize45KB
MD5a4d7b234b185ae7b51fb935d3c9be040
SHA11050be5826fa8d4bc7d4ab58ccc536da9523f22a
SHA2562d373d8719083e686f8018e34d8b28e91aa6c042d5b0ff0165807135516f460b
SHA512b21c00ec046e9b39b4388fc2a40a39cc20dfd145cd55dc61f125566c01fde728d4f5a584b8ab861173f8ea80c8a4c9310859a63d0c4e763ee28ac6566ff242c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize45KB
MD59ba05e813c42a4698100263e0844b798
SHA114f45b697e5616c55654284c57671b5236424933
SHA256b1704ec056fbd2d853c49deaabc131512a9b28781cd1f3405244cfeb044c0c00
SHA512769fec490822f97da917f27e50daf6f91e61a7cedbad800014cb686b50e929a6c21f06a5d519bf37d8aabc6125add4d16f7ca73eb65c2fc5ad17562e0978bea4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\0e64a7aa-8e6e-452d-a252-ae4e523ff1bd
Filesize671B
MD522be978205b0a0dc5b95a079a793d80b
SHA15288ed97e227439afa94e9c2bed7ba5b926a2a36
SHA25611adc3ffd7c624010aebe978041f8e4080268623d84378d506b7f071a427deee
SHA51215f95a06f06e2abfe629e0fde13e4b9036f520e64963f3b473c4d2002861584076a064bdf49a21641795bda05d6f0a30495780ade7274c61ac381d2cb2d6fa3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\9557c11b-7152-4f93-aa08-dff2ecbf85bc
Filesize982B
MD5f8c55acf50b54c702d7be80d835b8460
SHA1bc5e6e28923128db2887c0dd9e6023980870213f
SHA2568715c1f3dd11d9215702a2dbd4799e699c96eb2889d59901ca78a7a22e4b87dc
SHA5126395015019d31eae70bbbc4bc4ed7c2fa6d066e64767eb6d26ff464206bf00aa40e767ae4f5aecbe6d697d632f2e73cc1885c893f949ffaa1d1164f1d61c79fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\a88eb4e1-3516-405e-90d5-8839662012fa
Filesize1KB
MD5c877368440b480eebff6fa985ca158d6
SHA1429ceeab514007decf5a08208afcd391437acfcd
SHA2566e5c2df4516c2cb5338585c1370c3ca10564c2fd3f2ac18a89c326573496862d
SHA51286009ff5a4fdc9b7c8ae9f200e2cd4f3425ef2c6929127291c78327c510609d4151eda25df2582316cb7d85182efa117fd320b882ec8442a45497d22b3266c82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\c64e1e23-0dce-484c-bf63-27c8669b281d
Filesize734B
MD5def4a20c90c70a48ee948ee5a766039d
SHA1c9345e4d911c71e5270574e5ffbe16d05794c599
SHA256adbbc20496f55288c355bc370cf2e4ad3daa45edb6d977f13f746a498f4a65da
SHA5121d282ef953be64b012e3ea0fa7328204090f63e39a4440c37c9c1bdb2b55870efaeeca2dd6fab7476c138b44a9922a59e49d2f79fd5046a6736690f1f31630c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\f9ff8e00-5bdc-4b7d-b923-c4fdaa1ad9eb
Filesize25KB
MD56419435d378793c41f0c6d2274b4191a
SHA10797e2a2fc52aa4ecae68dcdba8d0c0cce6fc293
SHA25693d8fd3ce2836d6f6c472469cbfb492062b6209a511546d364f552852e47e676
SHA512ad5e89aa9d28ce669048390d1fc92d2b0b3abd14fb17a3d57a745c2d727a4f13151271452ad6b1fc57b85746c573782234865e463605e933b8351bb057974415
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\fd87b586-6d35-46c8-94e1-3f687ed622d5
Filesize2KB
MD59018c88419e87897f43110492dc65a04
SHA14c8e69eca1e2b82470f98a3453ac215e6272e252
SHA2566d998e411d629e909fa0536a62d762918d446303a493c95a03555b06e3df5beb
SHA5120c5d8fa0c4f10dcdeb294f6ee0913f42796882e92019e8bd1c8672befba8fe15c88d3470bef453797dc386166aaa504de54cc6d4f9b075c8329c68932b9342af
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
Filesize
11KB
MD5b4866c996073b80c514990bc1557d7bb
SHA109db8c39f3dba99808a2ea51b506d2dc46a74b80
SHA2563ba3c83ab66faecc0f90c5ae64f7327c8785fdd14ede4ae0bb8bf6de699f46d1
SHA512bb549d890d90a12330c5932c21421fb0a5f0688a818781c72fb4791144c1a8702db529f4493dc40acb6bcd87c25214c13eed66e98503452a03ca73909357e088
-
Filesize
12KB
MD51861cca3e577e1e283ba964c9a7dfafe
SHA1be98d79a2ae34ae80f3f9a3e396a3947fe2c52fe
SHA256ac533f2da6ff6c510142d3f7c9985b389c1572478f903acd695684da9a9d56f3
SHA512d91dde23a3b3cff778cdf82c8eb56396535def893d105950445881a7b7b846bf6949e1835b1d1793d7680169ee9aade4e801982acbda31d79b90ce89fd57ea80
-
Filesize
12KB
MD562f77acd33dfe3022eb0a748fde5499c
SHA1985ddc80732966074f96193af9dbe7c8c7bb813a
SHA25628b581b63bb0a5479e5ffd0bb5f6ba5acf74bb3fe898a91eca8eb474a4ff9b61
SHA512d0e7ba53de186f7d183da09505f0b3b0047315b6b2b2818e04b08138f377ee0ea145f9bc7b180876be9db82f2238488866cbb4634266c5f07276aeb7b90dc096
-
Filesize
10KB
MD563e62f0a11ee11b3a500da3e4a03ccf1
SHA1a1c1ca3e66a04545e5c2a25a3c635702cefa0ac7
SHA25659ef6b272261ba1aed0f2c572231d0185481a289544ff5b617582d14d54707f7
SHA51217d024320a9de65b44c92ad9e53a7d1896218c54d3a0cfa39e0c98ee22feeb7399db36c136fbde1b67becdf98f91ee8660bf8aa77f733d95a15046ca908b77a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5cf4460d41eb07b24383f496ca6fbb1f6
SHA1d4fe9ec3046dd369c0bde4e2106b590a7f5acff3
SHA25680dec03c70ff4f7a4408ff71b3bf1357601a8d10b0bb837948fa35621114e8ff
SHA512ad11ab3fa1f2ed41cab5ffc839225d6e79eefc22b13e26878f94f576f1c6907a695bb50ed5c26e316a559bf8dcbbf3f5fe9f6265582b7567ae92f8b249447cdb
-
Filesize
147B
MD56fac30c6aeb8579559e615cab61c553e
SHA1ccaac9d9a91496a2ff6d94272e67ccf853e5d6f8
SHA256f3340a0498a1387b2e127b112d6c5301fc8701aa5ba7f0948e34b2875b277702
SHA51210637368708137544065ef625c968ebcdfab6c4fbe63515eb5f40009a7fa45f596c46905d26442d43dc6419207fb73d8a3599e40cf41a2c755a068e724fe3103
-
Filesize
2.3MB
MD51b54b70beef8eb240db31718e8f7eb5d
SHA1da5995070737ec655824c92622333c489eb6bce4
SHA2567d3654531c32d941b8cae81c4137fc542172bfa9635f169cb392f245a0a12bcb
SHA512fda935694d0652dab3f1017faaf95781a300b420739e0f9d46b53ce07d592a4cfa536524989e2fc9f83602d315259817638a89c4e27da709aada5d1360b717eb