Analysis
-
max time kernel
180s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 18:49
Static task
static1
Behavioral task
behavioral1
Sample
SteamAchievementManager-7.0.37(1).zip
Resource
win10v2004-20241007-en
General
-
Target
SteamAchievementManager-7.0.37(1).zip
-
Size
54KB
-
MD5
bc16c7824ce9360fc3737a0051d272a6
-
SHA1
883b3327de19c2a27c185c041c22a330a17ae577
-
SHA256
9b194fe4e124ff2715c3fd5e7e65e7e999ddc58e4fa89ebb9fbd43938a50f7ea
-
SHA512
699e93e0b50410681412542b07582981c95e57c73ba685000209d41a3437ff4bde3a5bccf469c11b9a71e15a6ce44b2d02336d63642b0ec72490e7c84a1a6626
-
SSDEEP
1536:+c+22zeNApnPsxu9WdWXSSlIrSHtIxHrWVXY:+71eepPY316HuwY
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation SAM.Game.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation steamwebhelper.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation steamwebhelper.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation SAM.Game.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation SAM.Game.exe -
Executes dropped EXE 23 IoCs
pid Process 3516 SAM.Picker.exe 4072 SAM.Game.exe 724 SAM.Picker.exe 3312 SAM.Picker.exe 5044 SAM.Game.exe 3844 SAM.Picker.exe 3540 SteamSetup.exe 2188 steamservice.exe 5704 steam.exe 8484 steam.exe 8544 steamwebhelper.exe 8576 steamwebhelper.exe 8740 steamwebhelper.exe 8904 steamwebhelper.exe 9148 gldriverquery64.exe 1260 steamwebhelper.exe 3464 steamwebhelper.exe 9248 gldriverquery.exe 9328 vulkandriverquery64.exe 9412 vulkandriverquery.exe 18116 SAM.Picker.exe 18016 SAM.Game.exe 17964 SAM.Picker.exe -
Loads dropped DLL 64 IoCs
pid Process 3516 SAM.Picker.exe 3516 SAM.Picker.exe 4072 SAM.Game.exe 4072 SAM.Game.exe 724 SAM.Picker.exe 724 SAM.Picker.exe 3312 SAM.Picker.exe 3312 SAM.Picker.exe 5044 SAM.Game.exe 5044 SAM.Game.exe 3844 SAM.Picker.exe 3844 SAM.Picker.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8576 steamwebhelper.exe 8576 steamwebhelper.exe 8576 steamwebhelper.exe 8484 steam.exe 8740 steamwebhelper.exe 8740 steamwebhelper.exe 8484 steam.exe 8740 steamwebhelper.exe 8740 steamwebhelper.exe 8740 steamwebhelper.exe 8740 steamwebhelper.exe 8740 steamwebhelper.exe 8740 steamwebhelper.exe 8740 steamwebhelper.exe 8904 steamwebhelper.exe 8904 steamwebhelper.exe 8904 steamwebhelper.exe 8484 steam.exe 1260 steamwebhelper.exe 1260 steamwebhelper.exe 1260 steamwebhelper.exe 3464 steamwebhelper.exe 3464 steamwebhelper.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -silent" SteamSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\sd_r4_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps5_trackpad_up_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\shared_rstick_up.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\switchpro_l2_soft_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\genesis_x.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\btnStdLeft.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\ps5_trackpad_up.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\ps_outlined_button_x_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\xbox_rt_soft.svg_ steam.exe File opened for modification C:\Program Files (x86)\Steam\.crash steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\ps4_trackpad_swipe.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\shared_button_b_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\shared_button_y_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\shared_color_outlined_button_a_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\[email protected]_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\friends\icon_groupchat_activity.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\resource\platform_finnish.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\ps4_trackpad_click_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\templates\wasd.vdf_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\friends\BroadcastChannelLive.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steam\cached\offline_indonesian.html_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\shared_rstick_click_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\localization\steampops_koreana-json.js_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\[email protected]_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\ps5_trackpad_r_up.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\shared_color_outlined_button_x_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\shared_outlined_button_y_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\shared_rstick_click_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\public\UseOfflineModeChosen.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_030_inv_0302.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\localization\switch_controller_spanish.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\resource\overlay_romanian.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steam\cached\steamui_postlogon_japanese.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\shared_color_outlined_button_y_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\sounds\deck_ui_misc_10.wav_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\bin\cef\cef.win7x64\dxcompiler.dll_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\broadcastapp.js_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_010_wpn_0518.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_040_act_0320.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\inbox_moderatormessage.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\sc_dpad_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\switchpro_button_minus_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steam\cached\offline_czech.html_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\[email protected]_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\friends\trackerui_french.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\resource\overlay_bulgarian.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\sd_button_view.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\shared_touch_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\sc_button_r_arrow.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\sc_touchpad_click_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\switchpro_lstick_left_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_030_inv_0030.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_100_target_0090.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\icon_addgame.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\ps_outlined_button_x.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\resource\filter_banned_english.txt.gz_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\vrwarning_dialog.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\localization\switch_controller_koreana.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\friends\friendaliasesdialog.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\bin\cef\cef.win7x64\locales\tr.pak_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\joyconpair_left_sr_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\[email protected]_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\friends\icon_connected_speaking.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\icon_button_friends_mousedown.tga_ steam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAM.Picker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAM.Picker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SteamSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAM.Game.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAM.Picker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAM.Picker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gldriverquery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAM.Game.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vulkandriverquery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAM.Picker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAM.Game.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAM.Picker.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steam.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steamwebhelper.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SAM.Picker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SAM.Picker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steamwebhelper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SAM.Picker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SAM.Picker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\URL Protocol steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steam steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steam\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steam\Shell\Open steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steam\DefaultIcon steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\DefaultIcon\ = "steam.exe" steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\ = "URL:steamlink protocol" steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink\Shell\Open\Command steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steamlink\Shell\Open\Command steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open\Command steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steam\Shell\Open\Command steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steamlink\URL Protocol steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steam\Shell\Open\Command steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open\Command steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\DefaultIcon\ = "steam.exe" steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink\DefaultIcon steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steam\ = "URL:steam protocol" steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steam\URL Protocol steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steamlink steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\ = "URL:steam protocol" steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\URL Protocol steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steamlink\Shell\Open steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steamlink\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steam\Shell steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steamlink\ = "URL:steamlink protocol" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steamlink\Shell steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steam\DefaultIcon steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steam\DefaultIcon\ = "steam.exe" steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steamlink\DefaultIcon\ = "steam.exe" steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open steamservice.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\steamlink\DefaultIcon steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steam steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink steamservice.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 714641.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 944 msedge.exe 944 msedge.exe 3580 msedge.exe 3580 msedge.exe 3604 identity_helper.exe 3604 identity_helper.exe 208 msedge.exe 208 msedge.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 3540 SteamSetup.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe 8484 steam.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 692 7zFM.exe 4676 OpenWith.exe 8484 steam.exe 18116 SAM.Picker.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeRestorePrivilege 692 7zFM.exe Token: 35 692 7zFM.exe Token: SeSecurityPrivilege 692 7zFM.exe Token: SeSecurityPrivilege 2188 steamservice.exe Token: SeSecurityPrivilege 2188 steamservice.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeDebugPrivilege 18116 SAM.Picker.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeDebugPrivilege 17964 SAM.Picker.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe Token: SeShutdownPrivilege 8544 steamwebhelper.exe Token: SeCreatePagefilePrivilege 8544 steamwebhelper.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
pid Process 692 7zFM.exe 692 7zFM.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 5704 steam.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 17964 SAM.Picker.exe -
Suspicious use of SendNotifyMessage 39 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe 8544 steamwebhelper.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4676 OpenWith.exe 4224 AcroRd32.exe 4224 AcroRd32.exe 4224 AcroRd32.exe 4224 AcroRd32.exe 8484 steam.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4072 wrote to memory of 724 4072 SAM.Game.exe 89 PID 4072 wrote to memory of 724 4072 SAM.Game.exe 89 PID 4072 wrote to memory of 724 4072 SAM.Game.exe 89 PID 4676 wrote to memory of 4224 4676 OpenWith.exe 95 PID 4676 wrote to memory of 4224 4676 OpenWith.exe 95 PID 4676 wrote to memory of 4224 4676 OpenWith.exe 95 PID 5044 wrote to memory of 3844 5044 SAM.Game.exe 100 PID 5044 wrote to memory of 3844 5044 SAM.Game.exe 100 PID 5044 wrote to memory of 3844 5044 SAM.Game.exe 100 PID 3580 wrote to memory of 4288 3580 msedge.exe 102 PID 3580 wrote to memory of 4288 3580 msedge.exe 102 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 3920 3580 msedge.exe 103 PID 3580 wrote to memory of 944 3580 msedge.exe 104 PID 3580 wrote to memory of 944 3580 msedge.exe 104 PID 3580 wrote to memory of 2440 3580 msedge.exe 105 PID 3580 wrote to memory of 2440 3580 msedge.exe 105 PID 3580 wrote to memory of 2440 3580 msedge.exe 105 PID 3580 wrote to memory of 2440 3580 msedge.exe 105 PID 3580 wrote to memory of 2440 3580 msedge.exe 105 PID 3580 wrote to memory of 2440 3580 msedge.exe 105 PID 3580 wrote to memory of 2440 3580 msedge.exe 105 PID 3580 wrote to memory of 2440 3580 msedge.exe 105 PID 3580 wrote to memory of 2440 3580 msedge.exe 105 PID 3580 wrote to memory of 2440 3580 msedge.exe 105 PID 3580 wrote to memory of 2440 3580 msedge.exe 105
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SteamAchievementManager-7.0.37(1).zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:692
-
C:\Users\Admin\Desktop\SAM.Picker.exe"C:\Users\Admin\Desktop\SAM.Picker.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3516
-
C:\Users\Admin\Desktop\SAM.Game.exe"C:\Users\Admin\Desktop\SAM.Game.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\Desktop\SAM.Picker.exe"C:\Users\Admin\Desktop\SAM.Picker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:724
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\SAM.API.dll"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4224
-
-
C:\Users\Admin\Desktop\SAM.Picker.exe"C:\Users\Admin\Desktop\SAM.Picker.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3312
-
C:\Users\Admin\Desktop\SAM.Game.exe"C:\Users\Admin\Desktop\SAM.Game.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\Desktop\SAM.Picker.exe"C:\Users\Admin\Desktop\SAM.Picker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd55d346f8,0x7ffd55d34708,0x7ffd55d347182⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6316 /prefetch:82⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2160,12899759025025098035,16297904260012955241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Users\Admin\Downloads\SteamSetup.exe"C:\Users\Admin\Downloads\SteamSetup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3540 -
C:\Program Files (x86)\Steam\bin\steamservice.exe"C:\Program Files (x86)\Steam\bin\steamservice.exe" /Install3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
-
C:\Program Files (x86)\Steam\steam.exe"C:\Program Files (x86)\Steam\steam.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:5704 -
C:\Program Files (x86)\Steam\steam.exe"C:\Program Files (x86)\Steam\steam.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:8484 -
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" "-lang=en_US" "-cachedir=C:\Users\Admin\AppData\Local\Steam\htmlcache" "-steampid=8484" "-buildid=1733265492" "-steamid=0" "-logdir=C:\Program Files (x86)\Steam\logs" "-uimode=7" "-startcount=0" "-steamuniverse=Public" "-realm=Global" "-clientui=C:\Program Files (x86)\Steam\clientui" "-steampath=C:\Program Files (x86)\Steam\steam.exe" "-launcher=0" --valve-enable-site-isolation --enable-smooth-scrolling --enable-direct-write "--log-file=C:\Program Files (x86)\Steam\logs\cef_log.txt" --disable-quick-menu "--enable-features=PlatformHEVCDecoderSupport" "--disable-features=SpareRendererForSitePerProcess,DcheckIsFatal,ValveFFmpegAllowLowDelayHEVC"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:8544 -
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=crashpad-handler /prefetch:4 --max-uploads=5 --max-db-size=20 --max-db-age=5 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files (x86)\Steam\dumps" "--metrics-dir=C:\Users\Admin\AppData\Local\CEF\User Data" --url=https://crash.steampowered.com/submit --annotation=platform=win64 --annotation=product=cefwebhelper --annotation=version=1733265492 --initial-client-data=0x280,0x284,0x288,0x27c,0x28c,0x7ffd5687af00,0x7ffd5687af0c,0x7ffd5687af184⤵
- Executes dropped EXE
- Loads dropped DLL
PID:8576
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=gpu-process --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1733265492 --steamid=0 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1588,i,16968461678268890766,6708435510741014968,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=1592 --mojo-platform-channel-handle=1580 /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:8740
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1733265492 --steamid=0 --field-trial-handle=2268,i,16968461678268890766,6708435510741014968,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=2272 --mojo-platform-channel-handle=2264 /prefetch:34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:8904
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1733265492 --steamid=0 --field-trial-handle=2752,i,16968461678268890766,6708435510741014968,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=2756 --mojo-platform-channel-handle=2716 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1260
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=renderer --user-agent-product="Valve Steam Client" --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1733265492 --steamid=0 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,16968461678268890766,6708435510741014968,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=3164 --mojo-platform-channel-handle=3092 /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3464
-
-
-
C:\Program Files (x86)\Steam\bin\gldriverquery64.exe.\bin\gldriverquery64.exe3⤵
- Executes dropped EXE
PID:9148
-
-
C:\Program Files (x86)\Steam\bin\gldriverquery.exe.\bin\gldriverquery.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9248
-
-
C:\Program Files (x86)\Steam\bin\vulkandriverquery64.exe.\bin\vulkandriverquery64.exe3⤵
- Executes dropped EXE
PID:9328
-
-
C:\Program Files (x86)\Steam\bin\vulkandriverquery.exe.\bin\vulkandriverquery.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9412
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4cc 0x5081⤵PID:9080
-
C:\Users\Admin\Desktop\SAM.Picker.exe"C:\Users\Admin\Desktop\SAM.Picker.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:18116
-
C:\Users\Admin\Desktop\SAM.Game.exe"C:\Users\Admin\Desktop\SAM.Game.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:18016 -
C:\Users\Admin\Desktop\SAM.Picker.exe"C:\Users\Admin\Desktop\SAM.Picker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:17964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD533bcb1c8975a4063a134a72803e0ca16
SHA1ed7a4e6e66511bb8b3e32cbfb5557ebcb4082b65
SHA25612222b0908eb69581985f7e04aa6240e928fb08aa5a3ec36acae3440633c9eb1
SHA51213f3a7d6215bb4837ea0a1a9c5ba06a985e0c80979c25cfb526a390d71a15d1737c0290a899f4705c2749982c9f6c9007c1751fef1a97b12db529b2f33c97b49
-
Filesize
2.5MB
MD5ba0ea9249da4ab8f62432617489ae5a6
SHA1d8873c5dcb6e128c39cf0c423b502821343659a7
SHA256ce177dc8cf42513ff819c7b8597c7be290f9e98632a34ecd868dc76003421f0d
SHA51252958d55b03e1ddc69afc2f1a02f7813199e4b3bf114514c438ab4d10d5ca83b865ba6090550951c0a43b666c6728304009572212444a27a3f5184663f4b0b8b
-
Filesize
1KB
MD56e6a2b18264504cc084caa3ad0bfc6ae
SHA1b177d719bd3c1bc547d5c97937a584b8b7d57196
SHA256f3847b5e4a40d9cf76df35398bb555117dfe3626c00a91f2babdedb619d6ad53
SHA51274199ff275400b451642cde0a13b56709735676959d65da11ac76dd645ab11dac5de048ff7ede0cb8adb3a3056b3ecbeb3dc7481bac3768d02051e564c74b679
-
Filesize
11KB
MD5d51a57cf2d8636c1952725f91e79f54c
SHA1b5aa56fa754b8068900f2849fb0d8215f20eeaa9
SHA256a6cf659f68a7b9fd8bdf4c70566defe0a8687d4008af3ac9bf094d492c3e21e4
SHA51279495e37f9de94b0bf169217b923be07079a21b0e8f0d22a323de4f64d5676448534d99392ecd68284b52220c25a17e579e84909b646804795d7d9ee8948c62f
-
Filesize
1KB
MD5a2ec2e91c3ef8c42e22c4887d032b333
SHA1e2c738a2e9400535b74e2263c7e7d1ecefe575f2
SHA2568f9f970835f133258a7f740126012439385bbaa5a1d6a9d0d967a390977441c3
SHA512b069d241efb19e09ec8b5e60ef6c43e00d5cc0f774b9340127c2180356dd1964ac625c1afdfaee5f99e72b26f56046fc329aadbbc365b403af765a55e9c9aab3
-
Filesize
184B
MD53cdebc58a05cdd75f14e64fb0d971370
SHA1edf2d4a8a5fc017e29bf9fb218db7dd8b2be84fe
SHA256661f122934bbc692266940a1fe2e5e51d4d460efb29d75695b8d5241c6e11da7
SHA512289c40fae5ec1d3dd8b5b00dd93cf9cada2cb5c12bcfefea8c862ddf0a16dced15d6814dad771af9103b3a5d3016d301ee40058edde3fdea30d9767146d11cd6
-
C:\Program Files (x86)\Steam\package\tmp\graphics\[email protected]_
Filesize15KB
MD5577b7286c7b05cecde9bea0a0d39740e
SHA1144d97afe83738177a2dbe43994f14ec11e44b53
SHA256983aa3928f15f5154266be7063a75e1fce87238bbe81a910219dea01d5376824
SHA5128cd55264a6e973bb6683c6f376672b74a263b48b087240df8296735fd7ae6274ee688fdb16d7febad14288a866ea47e78b114c357a9b03471b1e72df053ebcb0
-
Filesize
20KB
MD500bf35778a90f9dfa68ce0d1a032d9b5
SHA1de6a3d102de9a186e1585be14b49390dcb9605d6
SHA256cab3a68b64d8bf22c44080f12d7eab5b281102a8761f804224074ab1f6130fe2
SHA512342c9732ef4185dee691c9c8657a56f577f9c90fc43a4330bdc173536750cee1c40af4adac4f47ac5aca6b80ab347ebe2d31d38ea540245b38ab72ee8718a041
-
Filesize
23B
MD5836dd6b25a8902af48cd52738b675e4b
SHA1449347c06a872bedf311046bca8d316bfba3830b
SHA2566feb83ca306745d634903cf09274b7baf0ac38e43c6b3fab1a608be344c3ef64
SHA5126ab1e4a7fa9da6d33cee104344ba2ccb3e85cd2d013ba3e4c6790fd7fd482c85f5f76e9ae38c5190cdbbe246a48dae775501f7414bec4f6682a05685994e6b80
-
Filesize
4KB
MD50340d1a0bbdb8f3017d2326f4e351e0a
SHA190d078e9f732794db5b0ffeb781a1f2ed2966139
SHA2560fcd7ae491b467858f2a8745c5ecdd55451399778c2119517ee686d1f264b544
SHA5129d23e020875ed35825169a6542512ec2ffdb349472a12eb1e59ddc635e57c8fd65fa919873821e35c755aa7d027c9a62d3d0fa617340449d7b2c4cf8dd707e93
-
Filesize
6KB
MD54c81277a127e3d65fb5065f518ffe9c2
SHA1253264b9b56e5bac0714d5be6cade09ae74c2a3a
SHA25676a6bd74194efd819d33802decdfddaae893069d7000e44944dda05022cfa6d9
SHA512be077b61f3b6d56a1f4d24957deaf18d2dff699bda6569604aac4f1edb57c3cfd0abc5e2a67809f72e31a90b4aed0813536c153886da2099376964c60e56001a
-
Filesize
4KB
MD52158881817b9163bf0fd4724d549aed4
SHA1c500f2e8f47a11129114ee4f19524aee8fecc502
SHA256650a265dffdc5dc50200bb82d56f416a3a423eecc08c962cfd1ba2d40a1ff3f7
SHA512f3594aad9d6c50254f690c903f078a5b7a58c33bd418abdad711ebb74cfbdb5564679593e08fb2d4378faaf4160d45e3d276ba1aa8a174ed77a5791bcac46f28
-
Filesize
4KB
MD503b664bd98485425c21cdf83bc358703
SHA10a31dcfeb1957e0b00b87c2305400d004a9a5bdb
SHA256fdf7b42b3b027a12e1b79cb10ab9e6e34c668b04eb9e8a907d8611ba46473115
SHA5124a8cdd4b98432ba9d9b36bc64aab9a2eab31a074d1cbdfab3d35a14216c60752b5580c41bbb70104993420043685d3bd47eb6637b8fcbb3f42f76a15e4be041d
-
Filesize
4KB
MD531a29061e51e245f74bb26d103c666ad
SHA1271e26240db3ba0dcffc10866ccfcfa1c33cf1cc
SHA25656c8a86fa95eab0d8f34f498e079b5516b96d2a2f1ad9c2a888555e50e47f192
SHA512f85865c1e9ab45e5586d3dd2b45d15265193e8a3c34b6bb1ac7e415a1ea878cfb044e8e01012e917e4f00bb9e0a422f56253f328df1bac99a145e19433354cf8
-
Filesize
4KB
MD5da6cd2483ad8a21e8356e63d036df55b
SHA10e808a400facec559e6fbab960a7bdfaab4c6b04
SHA256ebececd3f691ac20e5b73e5c81861a01531203df3cf2baa9e1b6d004733a42a6
SHA51206145861eb4803c9813a88cd715769a4baa0bab0e87b28f59aa242d4369817789f4c85114e8d0ceb502e080ec3ec03400385924ec7537e7b04f724ba7f17b925
-
Filesize
4KB
MD59e62fc923c65bfc3f40aaf6ec4fd1010
SHA18f76faff18bd64696683c2a7a04d16aac1ef7e61
SHA2568ff0f3cbdf28102ff037b9cda90590e4b66e1e654b90f9aea2cd5364494d02b7
SHA512c8ff15373b37e848e6239a82424569e77c82a5fc557d17e7d2ed1d0d2b2f7d026cc1e2bc98cb5ee945c02cfefb82803c23fa6a26f48ff0adcf762f94cd5dd035
-
Filesize
4KB
MD510c429eb58b4274af6b6ef08f376d46c
SHA1af1e049ddb9f875c609b0f9a38651fc1867b50d3
SHA256a1f6ba57ee41e009d904905c0ce5e75a59ee6790e08542561303109e1faafa13
SHA512d8760f61760bffd8671b727d386ae220e7e6e68829a01553cfd5eb60ef8bd1d7c1b25e7b17a6db5bd17ba6712ef44999726764459318e784843c73bc4facaf46
-
Filesize
4KB
MD55c026fd6072a7c5cf31c75818cddedec
SHA1341aa1df1d034e6f0a7dff88d37c9f11a716cae6
SHA2560828572e4fa00c186dbf1d9072a6154d65cb499c6a37e338f3305f77a2fee382
SHA512f9d28714b2a05f8d9025f1692e4d7e8baa6daf6176353f65646a38814a242ef2adededa44419edd69f10cf96ffba506dab7cb6e52111457bf69cffef12174b12
-
Filesize
6KB
MD5189ba063d1481528cbd6e0c4afc3abaa
SHA140bdd169fcc59928c69eea74fd7e057096b33092
SHA256c0a7a1df442ac080668762df795c72aa322e9d415c41bd0a4c676a4dc0551695
SHA512ce59ad9b17bab4de1254e92ce4fe7d8c8242832f62ab382e8f54199a9932cd11b5800cc33895441426373d5210cc74104e0271b721a7e26ed400b716ae4d5903
-
Filesize
4KB
MD518aaaf5ffcdd21b1b34291e812d83063
SHA1aa9c7ae8d51e947582db493f0fd1d9941880429f
SHA2561f45bb7bdfa01424f9237eec60eba35dc7f0dc4e8c2e193fe768fe96d3ff76d5
SHA5124f3e56d1abe26b56d3f805dc85baaca450c0c7bec57ebcf8a6bb6ebb8588307dad130c83bf792bac76694909a14fd6a4d7d1e9b31e32fba11256343b9fc18154
-
Filesize
4KB
MD51514d082b672b372cdfb8dd85c3437f1
SHA1336a01192edb76ae6501d6974b3b6f0c05ea223a
SHA2563b3c5c615fd82070cc951ab482d3de8cb12df0b3df59fbd11f9d3271fa2fbca4
SHA5124d41c945ce7c94746875b0dbceb14811d4966de4e97fe047406a304162fde7e1e2a16367fc2e43978e2e5aa66749f036b4444aa2312673c2cc3af296e8b77f55
-
Filesize
410B
MD53bbb825ef1319deb378787046587112b
SHA167da95f0031be525b4cf10645632ca34d66b913b
SHA256d9c6d00fad02f7a9ef0fcddc298ffd58b17020fb12b1336d5733237cbfadb1e0
SHA5127771ae543e188d544e1bb6c65e0453a6777c1c39790a355f4cce652a815bfaf94dd426de3db910a67bd06e463ac0143d9e2ca44d2b12af7f0d84c27b4a09cc54
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
67KB
MD569df804d05f8b29a88278b7d582dd279
SHA1d9560905612cf656d5dd0e741172fb4cd9c60688
SHA256b885987a52236f56ce7a5ca18b18533e64f62ab64eb14050ede93c93b5bd5608
SHA5120ef49eeeeb463da832f7d5b11f6418baa65963de62c00e71d847183e0035be03e63c097103d30329582fe806d246e3c0e3ecab8b2498799abbb21d8b7febdc0e
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD53064d846adb5d34f50babe205ffe5741
SHA188abf2d4ffed1b9aa14563e114479747724d9a74
SHA256ac323b7533e2a91beaa742efb6aafdec0bde99062ef5c08cb6eeecd6afff872a
SHA512ed3a67eac2f6920d944f1ccfbf777140a07ebbebb8d25fb1be54970b0209bf48754f65eded0af22771bc898c0ff85b463fa43208941502cdb069a52087283994
-
Filesize
799B
MD595c5f701b5b71eb273f78c940903b510
SHA19062a8f6f348b9d2fd7229dc27bdb2f07763632e
SHA2563e608e90f3099f553c9c719b60269b1ba8561f2f944e147f2d9da3c75bb0b26e
SHA512572b6a6b0e5ea810ca99bfefe1384cdb20a15b61d331e6221760298515ae21ae93c88607c24d0ba147c92a31c22c744edc19082c29f3b557f1047641e39b48b5
-
Filesize
6KB
MD5594bad793cb8a483fbc4ab104fcdf4a3
SHA12e8a54c808238d6307a7f451ac4d7b89454da132
SHA256b9e62edd7da3be3be694f589c100b3f6a3789dfedb1c0acf0a7fe6978e24c7bb
SHA5122b5cdb8af26d947b466e363e7f823e872d5e27286df71aee187ca4a19d19da6ed4a28775f4d980efcaa5e59c890521d70f09cca90594b2c59bca023e7dbc495f
-
Filesize
7KB
MD5d22bb3aa4b6479f297f2d41786356950
SHA1600a3efba4e4db09b9f4fdbcb3a5eef0e53761a1
SHA256d8292c4edad1e8f7521f7d121f364b06dceb04099a4c75797821a5f3500bc31b
SHA512f6b95662ae54e4385ea4544abcc7f78bf6402772c139dccf4593dd9ddf7955312ec11fe97d14a07d31eb0a4688a68a95109161d033ab1962f56caac9edb7e675
-
Filesize
6KB
MD57bcbb43e24c7c228de783a0e1d253109
SHA1ada226739bf2c7a6d9e40a8a8f90cd6986e5ceb4
SHA2560d97a6940c9ebaddd2181b16065b13bfeb617c54a626a4a90f360edeeedb1027
SHA512d85b6fe0394299ae2e08929ebf09914623017594c45d46901a94958298399b249d11491e4140533df90147834a1a2ce85c3fe07ad227602e1fa894d812e12b2a
-
Filesize
5KB
MD51979a4b19431fb0e6c78ac76973c4496
SHA166e878ec48b274a93bbb952e6fedfc31dd4a0545
SHA25600b7be9d9e37632b0980bd7a12f65ad167764d7394509588cec4b47460d286cf
SHA512d2a08701346710250bef85e4d29d6730ef191b68c9f65efacd7659e694c5c4ee18293e64cd1dc748bb9a4ce1b46df1eae96fef40ec5f74ef5d23baa79a31f5ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD582996509f1455b2ab6bf44da4df65037
SHA1ab65f19d99fc04a7677be618ddfbb899150dc53d
SHA2560ff3086a04948665c91333b927b6cff3156b9c677d89ed437264c2c7f50ed38b
SHA5123acaf667d7b058b85d353fddb4400187b6579fc8a49eb8fa788c416661aa54420c098b6a82ae1fc210e2734fc041ba3e71e9cfe79c78bf59a54767e8d243c5c3
-
Filesize
10KB
MD5a759c1ffe8cc4b9e9954c6687f0c2751
SHA16cf14868b4f7dd8bb75a52bc779d4640bb1241ad
SHA2564ee9201ce243e075e1384a3d5befc227b0cd3d7fb1671167e783e8b6104c62ae
SHA5121bf2268448783fe0f301d15cca629adec23aabffd51153b7ea647da94877b0a01bfe1a287108ea2851dbc3ca1e8c8d62594322d6e21f98e753f3f0a4b512da53
-
Filesize
48B
MD5c55997ee56a4852e623225db2de09805
SHA152f44b40fba305509bf4c5d119fef50e33b664d5
SHA256e0e9dced8057a9b0a2a7dbe7dc9977721c4aab04d129ffe725caaa1981a60afd
SHA512c740f912674821499ff11a3f95265ffa917eaf86628a6dfc945c6e778cf35ef1e30a05204679b563f0dc3279eafa39dae36e6b72a30382e9179baa172a7cad5d
-
Filesize
216B
MD5c0e00ec5c7f3de342cb541e1fed6b6b7
SHA1511433a9a12c4aaeccdfef8fb94ed6148c11b1d4
SHA256cf494407df360ce59e1f0a4a2ac1324caefc9ac3fda30f626604b4f82e32d3a6
SHA512a836d1687b12f46b72677c047eaf84b323572c69307e9ef6c6fd3ff294c0e1d97e48dde86cfd2dfdb94e5743e06ca100e4e013c3657c26baf6fdee15e57214da
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
300B
MD571e4378436404967e0dad528c8881ddc
SHA1d22ae584bcd43d2b467ec153cc25ee6b63057694
SHA256fafdbedadda597077a691db035ed93eeef37e3af3f7295839d268fa65bf869a4
SHA512bec479a6022155e2757ab25e459e6c623da8402a8e27587d7324a2205dff0d208a8d55163fae0067bffb841dd8ecd09d788a3681cc9d8e72bbb1da202beb08aa
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
110KB
MD5db11ab4828b429a987e7682e495c1810
SHA129c2c2069c4975c90789dc6d3677b4b650196561
SHA256c602c44a4d4088dbf5a659f36ba1c3a9d81f8367577de0cb940c0b8afee5c376
SHA512460d1ccfc0d7180eae4e6f1a326d175fec78a7d6014447a9a79b6df501fa05cd4bd90f8f7a85b7b6a4610e2fa7059e30ae6e17bc828d370e5750de9b40b9ae88
-
Filesize
22KB
MD5a36fbe922ffac9cd85a845d7a813f391
SHA1f656a613a723cc1b449034d73551b4fcdf0dcf1a
SHA256fa367ae36bfbe7c989c24c7abbb13482fc20bc35e7812dc377aa1c281ee14cc0
SHA5121d1b95a285536ddc2a89a9b3be4bb5151b1d4c018ea8e521de838498f62e8f29bb7b3b0250df73e327e8e65e2c80b4a2d9a781276bf2a51d10e7099bacb2e50b
-
Filesize
150KB
MD53614a4be6b610f1daf6c801574f161fe
SHA16edee98c0084a94caa1fe0124b4c19f42b4e7de6
SHA25616e0edc9f47e6e95a9bcad15adbdc46be774fbcd045dd526fc16fc38fdc8d49b
SHA51206e0eff28dfd9a428b31147b242f989ce3e92474a3f391ba62ac8d0d05f1a48f4cf82fd27171658acbd667eaffb94cb4e1baf17040dc3b6e8b27f39b843ca281
-
Filesize
20KB
MD54e5bc4458afa770636f2806ee0a1e999
SHA176dcc64af867526f776ab9225e7f4fe076487765
SHA25691a484dc79be64dd11bf5acb62c893e57505fcd8809483aa92b04f10d81f9de0
SHA512b6f529073a943bddbcb30a57d62216c78fcc9a09424b51ac0824ebfb9cac6cae4211bda26522d6923bd228f244ed8c41656c38284c71867f65d425727dd70162
-
Filesize
17KB
MD52095af18c696968208315d4328a2b7fe
SHA1b1b0e70c03724b2941e92c5098cc1fc0f2b51568
SHA2563e2399ae5ce16dd69f7e2c71d928cf54a1024afced8155f1fd663a3e123d9226
SHA51260105dfb1cd60b4048bd7b367969f36ed6bd29f92488ba8cfa862e31942fd529cbc58e8b0c738d91d8bef07c5902ce334e36c66eae1bfe104b44a159b5615ae5
-
Filesize
15KB
MD508072dc900ca0626e8c079b2c5bcfcf3
SHA135f2bfa0b1b2a65b9475fb91af31f7b02aee4e37
SHA256bb6ce83ddaad4f530a66a1048fac868dfc3b86f5e7b8e240d84d1633e385aee8
SHA5128981da7f225eb78c414e9fb3c63af0c4daae4a78b4f3033df11cce43c3a22fdbf3853425fe3024f68c73d57ffb128cba4d0db63eda1402212d1c7e0ac022353c
-
Filesize
30KB
MD57dab915b0e87cbe1e6ab045193eeef10
SHA162cebc30eb4a649a0297e8ae6c134c7394a139ec
SHA25626e596ec9618716f2dba81d187af821dde15e97acbd2d4c9d3847b2b5cfb104f
SHA5120689301792464d984cea9a50af8a6d6899aff66ba64d5cea46cb330ad1ab570906a2453bb50a9c729ea59929408f8af215890ed0cb7500bbe72cdcbbf80598a3
-
Filesize
48KB
MD532819b63faeb54f43efcc84a311b6cb9
SHA168948c48f46b88e3356fecc259bda2a3f3ddb7ae
SHA2562c22d076aadd52415a19a1b3f25fa680e9176ddf236fbd20e6ea7c521d14e184
SHA5122c04a722ae272381375ed30950c403a7c673e9f0758dd4f00a78b69e029e92f63a12f97359c6e376a69603919139fb173c0c4894970ad24515dc600379b12580
-
Filesize
51KB
MD5ecde7ea1b21cfc69aac007859a23581a
SHA198d66ccb4735fc9e8d5cb511106f1f555c051d5f
SHA2563f393afa3e341a3b46b7455a7dfbaab4c51c21939c911f1c1cda27b7f5eccb9b
SHA512a0da74c379a1ed2e11e60adeae074f666e99d1cba3be2f41b8c1547239f4b8fac365408540b9904fa1e4f180abecc7cc631e92ce412dd6fa30af07143dccfb1a
-
Filesize
2.3MB
MD51b54b70beef8eb240db31718e8f7eb5d
SHA1da5995070737ec655824c92622333c489eb6bce4
SHA2567d3654531c32d941b8cae81c4137fc542172bfa9635f169cb392f245a0a12bcb
SHA512fda935694d0652dab3f1017faaf95781a300b420739e0f9d46b53ce07d592a4cfa536524989e2fc9f83602d315259817638a89c4e27da709aada5d1360b717eb