Analysis
-
max time kernel
194s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 14:14
Behavioral task
behavioral1
Sample
SWA V2.exe
Resource
win10v2004-20241007-en
General
-
Target
SWA V2.exe
-
Size
5.5MB
-
MD5
ce45d4467d253fcaf5a937a85dbf8c5e
-
SHA1
f58ef5bedc2cd2a1609102f44d09f27b827702c1
-
SHA256
1b374a626da8d4ee3816742e32b96f97f9dbc2822e1648e3c0bbc56a653e8e13
-
SHA512
ffa8b1ab3659b089bef4e0928861dc36e17a66c55b271bf367bb730c51ddd8edd463199611d92e39e0b2a8e2ede50d15e4d29c9d540195006b9013da85fa11b8
-
SSDEEP
98304:Js+xoTSHvE7ZlqnioOi8cn3K2O8k6JFjE9X0Zd0GKApCByE9fyr:JnxvIZlqidiDOK69kZdxK1yD
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation SWA V2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation SWA V2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation SWA V2.exe -
Executes dropped EXE 2 IoCs
pid Process 2880 SteamSetup.exe 3776 steamservice.exe -
Loads dropped DLL 9 IoCs
pid Process 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 4596 SWA V2.exe 5288 SWA V2.exe -
resource yara_rule behavioral1/memory/2356-2-0x00007FF730270000-0x00007FF730B81000-memory.dmp vmprotect behavioral1/memory/2356-5-0x00007FF730270000-0x00007FF730B81000-memory.dmp vmprotect behavioral1/memory/4596-1218-0x00007FF730270000-0x00007FF730B81000-memory.dmp vmprotect behavioral1/memory/5288-1370-0x00007FF730270000-0x00007FF730B81000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -silent" SteamSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 15 raw.githubusercontent.com 159 discord.com 152 raw.githubusercontent.com 153 raw.githubusercontent.com 161 raw.githubusercontent.com 162 raw.githubusercontent.com 14 raw.githubusercontent.com 16 raw.githubusercontent.com 23 discord.com 24 discord.com -
Drops file in Program Files directory 35 IoCs
description ioc Process File created C:\Program Files (x86)\Steam\public\steambootstrapper_finnish.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_polish.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_ukrainian.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_vietnamese.txt SteamSetup.exe File created C:\Program Files (x86)\Common Files\Steam\steamservice.exe steamservice.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_danish.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_portuguese.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_schinese.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_turkish.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_norwegian.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_english.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_hungarian.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_japanese.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\bin\SteamService.exe SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_german.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_greek.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_koreana.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_swedish.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_french.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_dutch.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_romanian.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_czech.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_indonesian.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_italian.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_korean.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_brazilian.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_bulgarian.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_russian.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_spanish.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_tchinese.txt SteamSetup.exe File opened for modification C:\Program Files (x86)\Common Files\Steam\steamservice.exe steamservice.exe File created C:\Program Files (x86)\Steam\Steam.exe SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_thai.txt SteamSetup.exe File created C:\Program Files (x86)\Steam\uninstall.exe SteamSetup.exe File created C:\Program Files (x86)\Steam\public\steambootstrapper_latam.txt SteamSetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SteamSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamservice.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 21 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SWA V2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer SWA V2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer SWA V2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion SWA V2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer SWA V2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion SWA V2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SWA V2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion SWA V2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SWA V2.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\TypedURLs SWA V2.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133821152868355172" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" SWA V2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\steam\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "4" SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 19002f433a5c000000000000000000000000000000000000000000 SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" SWA V2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 SWA V2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\steam\URL Protocol steamservice.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 SWA V2.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\steam\Shell\Open\Command steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" SWA V2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0 SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff SWA V2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" SWA V2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\0 SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" SWA V2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 SWA V2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\URL Protocol steamservice.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "4294967295" SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 SWA V2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open steamservice.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 00000000ffffffff SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" SWA V2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell SWA V2.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink\DefaultIcon steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\steamlink\URL Protocol steamservice.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 SWA V2.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3350944739-639801879-157714471-1000\{3BC25F07-63DA-495A-86F1-C3EC53E9404C} msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff SWA V2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 SWA V2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} SWA V2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0 = 5000310000000000375af5711000537465616d003c0009000400efbe375af471375af5712e000000113d0200000009000000000000000000000000000000597cc00053007400650061006d00000014000000 SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\MRUListEx = ffffffff SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\0\NodeSlot = "6" SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" SWA V2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 SWA V2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" SWA V2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 SWA V2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\steam\ = "URL:steam protocol" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\steamlink\Shell steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 SWA V2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 SWA V2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 SWA V2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2356 SWA V2.exe 2356 SWA V2.exe 1572 msedge.exe 1572 msedge.exe 3488 msedge.exe 3488 msedge.exe 2204 chrome.exe 2204 chrome.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2880 SteamSetup.exe 2356 SWA V2.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 2356 SWA V2.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 4596 SWA V2.exe 4596 SWA V2.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 3044 msedge.exe 3044 msedge.exe 1608 msedge.exe 1608 msedge.exe 1776 taskmgr.exe 1776 taskmgr.exe 5504 msedge.exe 5504 msedge.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2356 SWA V2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 2356 SWA V2.exe 2356 SWA V2.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2880 SteamSetup.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe 1776 taskmgr.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2356 SWA V2.exe 2356 SWA V2.exe 2356 SWA V2.exe 2356 SWA V2.exe 2356 SWA V2.exe 2356 SWA V2.exe 2356 SWA V2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3488 2356 SWA V2.exe 84 PID 2356 wrote to memory of 3488 2356 SWA V2.exe 84 PID 3488 wrote to memory of 3040 3488 msedge.exe 85 PID 3488 wrote to memory of 3040 3488 msedge.exe 85 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 4780 3488 msedge.exe 86 PID 3488 wrote to memory of 1572 3488 msedge.exe 87 PID 3488 wrote to memory of 1572 3488 msedge.exe 87 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88 PID 3488 wrote to memory of 2000 3488 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWA V2.exe"C:\Users\Admin\AppData\Local\Temp\SWA V2.exe"1⤵
- Checks computer location settings
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/mMxPmzwXHY2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce8c446f8,0x7ffce8c44708,0x7ffce8c447183⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,12350147934211623227,12227263475096143077,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:23⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,12350147934211623227,12227263475096143077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,12350147934211623227,12227263475096143077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:83⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12350147934211623227,12227263475096143077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12350147934211623227,12227263475096143077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12350147934211623227,12227263475096143077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:13⤵PID:2668
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3832
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2204 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffcd628cc40,0x7ffcd628cc4c,0x7ffcd628cc582⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1820,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1816 /prefetch:22⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1772 /prefetch:32⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3668,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4412,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4628,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4040 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5032,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3436 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4704,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3164,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3520,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4896 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4868,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3556 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5240,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5188 /prefetch:22⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3532,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5436,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5104,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5764,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5536,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:460
-
-
C:\Users\Admin\Downloads\SteamSetup.exe"C:\Users\Admin\Downloads\SteamSetup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2880 -
C:\Program Files (x86)\Steam\bin\steamservice.exe"C:\Program Files (x86)\Steam\bin\steamservice.exe" /Install3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3776
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4068,i,6242664855496961258,2401250082559351620,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4504
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:1776
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\SWA V2.exe"C:\Users\Admin\AppData\Local\Temp\SWA V2.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/mMxPmzwXHY2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xfc,0x128,0x7ffce8c446f8,0x7ffce8c44708,0x7ffce8c447183⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16143500436279545344,3393093807510044897,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:23⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,16143500436279545344,3393093807510044897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,16143500436279545344,3393093807510044897,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:83⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16143500436279545344,3393093807510044897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:13⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16143500436279545344,3393093807510044897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16143500436279545344,3393093807510044897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:13⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2116,16143500436279545344,3393093807510044897,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4728 /prefetch:83⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2116,16143500436279545344,3393093807510044897,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3636 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5504
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5136
-
C:\Users\Admin\AppData\Local\Temp\SWA V2.exe"C:\Users\Admin\AppData\Local\Temp\SWA V2.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Enumerates system info in registry
PID:5288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/mMxPmzwXHY2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:2004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce8c446f8,0x7ffce8c44708,0x7ffce8c447183⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1484,12912193830283113141,3779870228348693286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:23⤵PID:5900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1484,12912193830283113141,3779870228348693286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:33⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1484,12912193830283113141,3779870228348693286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:83⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1484,12912193830283113141,3779870228348693286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:13⤵PID:5936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1484,12912193830283113141,3779870228348693286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1484,12912193830283113141,3779870228348693286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4416 /prefetch:13⤵PID:6020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1484,12912193830283113141,3779870228348693286,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3288 /prefetch:83⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1484,12912193830283113141,3779870228348693286,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3440 /prefetch:83⤵
- Modifies registry class
PID:956
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5500
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD5d5823f6a309b165eef7fe44c1c2e54dc
SHA1bab5ab7ae23d032ce9f7e4908bf45c3aa5e54442
SHA25629dc1687fba21f77979c3ac7fcf6c8ead939f1af1bda133588a8e3317f1a4a28
SHA512b42294938256cc70abb7c5a86e180558101a721b609415bc42db905b625982852441bc35dde105e83457c5ca79291c340a2bbb970aa9748cd0867d24602b8fa9
-
Filesize
4.2MB
MD533bcb1c8975a4063a134a72803e0ca16
SHA1ed7a4e6e66511bb8b3e32cbfb5557ebcb4082b65
SHA25612222b0908eb69581985f7e04aa6240e928fb08aa5a3ec36acae3440633c9eb1
SHA51213f3a7d6215bb4837ea0a1a9c5ba06a985e0c80979c25cfb526a390d71a15d1737c0290a899f4705c2749982c9f6c9007c1751fef1a97b12db529b2f33c97b49
-
Filesize
2.5MB
MD5ba0ea9249da4ab8f62432617489ae5a6
SHA1d8873c5dcb6e128c39cf0c423b502821343659a7
SHA256ce177dc8cf42513ff819c7b8597c7be290f9e98632a34ecd868dc76003421f0d
SHA51252958d55b03e1ddc69afc2f1a02f7813199e4b3bf114514c438ab4d10d5ca83b865ba6090550951c0a43b666c6728304009572212444a27a3f5184663f4b0b8b
-
Filesize
4KB
MD50340d1a0bbdb8f3017d2326f4e351e0a
SHA190d078e9f732794db5b0ffeb781a1f2ed2966139
SHA2560fcd7ae491b467858f2a8745c5ecdd55451399778c2119517ee686d1f264b544
SHA5129d23e020875ed35825169a6542512ec2ffdb349472a12eb1e59ddc635e57c8fd65fa919873821e35c755aa7d027c9a62d3d0fa617340449d7b2c4cf8dd707e93
-
Filesize
6KB
MD54c81277a127e3d65fb5065f518ffe9c2
SHA1253264b9b56e5bac0714d5be6cade09ae74c2a3a
SHA25676a6bd74194efd819d33802decdfddaae893069d7000e44944dda05022cfa6d9
SHA512be077b61f3b6d56a1f4d24957deaf18d2dff699bda6569604aac4f1edb57c3cfd0abc5e2a67809f72e31a90b4aed0813536c153886da2099376964c60e56001a
-
Filesize
4KB
MD52158881817b9163bf0fd4724d549aed4
SHA1c500f2e8f47a11129114ee4f19524aee8fecc502
SHA256650a265dffdc5dc50200bb82d56f416a3a423eecc08c962cfd1ba2d40a1ff3f7
SHA512f3594aad9d6c50254f690c903f078a5b7a58c33bd418abdad711ebb74cfbdb5564679593e08fb2d4378faaf4160d45e3d276ba1aa8a174ed77a5791bcac46f28
-
Filesize
4KB
MD503b664bd98485425c21cdf83bc358703
SHA10a31dcfeb1957e0b00b87c2305400d004a9a5bdb
SHA256fdf7b42b3b027a12e1b79cb10ab9e6e34c668b04eb9e8a907d8611ba46473115
SHA5124a8cdd4b98432ba9d9b36bc64aab9a2eab31a074d1cbdfab3d35a14216c60752b5580c41bbb70104993420043685d3bd47eb6637b8fcbb3f42f76a15e4be041d
-
Filesize
4KB
MD531a29061e51e245f74bb26d103c666ad
SHA1271e26240db3ba0dcffc10866ccfcfa1c33cf1cc
SHA25656c8a86fa95eab0d8f34f498e079b5516b96d2a2f1ad9c2a888555e50e47f192
SHA512f85865c1e9ab45e5586d3dd2b45d15265193e8a3c34b6bb1ac7e415a1ea878cfb044e8e01012e917e4f00bb9e0a422f56253f328df1bac99a145e19433354cf8
-
Filesize
4KB
MD5da6cd2483ad8a21e8356e63d036df55b
SHA10e808a400facec559e6fbab960a7bdfaab4c6b04
SHA256ebececd3f691ac20e5b73e5c81861a01531203df3cf2baa9e1b6d004733a42a6
SHA51206145861eb4803c9813a88cd715769a4baa0bab0e87b28f59aa242d4369817789f4c85114e8d0ceb502e080ec3ec03400385924ec7537e7b04f724ba7f17b925
-
Filesize
4KB
MD59e62fc923c65bfc3f40aaf6ec4fd1010
SHA18f76faff18bd64696683c2a7a04d16aac1ef7e61
SHA2568ff0f3cbdf28102ff037b9cda90590e4b66e1e654b90f9aea2cd5364494d02b7
SHA512c8ff15373b37e848e6239a82424569e77c82a5fc557d17e7d2ed1d0d2b2f7d026cc1e2bc98cb5ee945c02cfefb82803c23fa6a26f48ff0adcf762f94cd5dd035
-
Filesize
4KB
MD510c429eb58b4274af6b6ef08f376d46c
SHA1af1e049ddb9f875c609b0f9a38651fc1867b50d3
SHA256a1f6ba57ee41e009d904905c0ce5e75a59ee6790e08542561303109e1faafa13
SHA512d8760f61760bffd8671b727d386ae220e7e6e68829a01553cfd5eb60ef8bd1d7c1b25e7b17a6db5bd17ba6712ef44999726764459318e784843c73bc4facaf46
-
Filesize
4KB
MD55c026fd6072a7c5cf31c75818cddedec
SHA1341aa1df1d034e6f0a7dff88d37c9f11a716cae6
SHA2560828572e4fa00c186dbf1d9072a6154d65cb499c6a37e338f3305f77a2fee382
SHA512f9d28714b2a05f8d9025f1692e4d7e8baa6daf6176353f65646a38814a242ef2adededa44419edd69f10cf96ffba506dab7cb6e52111457bf69cffef12174b12
-
Filesize
6KB
MD5189ba063d1481528cbd6e0c4afc3abaa
SHA140bdd169fcc59928c69eea74fd7e057096b33092
SHA256c0a7a1df442ac080668762df795c72aa322e9d415c41bd0a4c676a4dc0551695
SHA512ce59ad9b17bab4de1254e92ce4fe7d8c8242832f62ab382e8f54199a9932cd11b5800cc33895441426373d5210cc74104e0271b721a7e26ed400b716ae4d5903
-
Filesize
4KB
MD518aaaf5ffcdd21b1b34291e812d83063
SHA1aa9c7ae8d51e947582db493f0fd1d9941880429f
SHA2561f45bb7bdfa01424f9237eec60eba35dc7f0dc4e8c2e193fe768fe96d3ff76d5
SHA5124f3e56d1abe26b56d3f805dc85baaca450c0c7bec57ebcf8a6bb6ebb8588307dad130c83bf792bac76694909a14fd6a4d7d1e9b31e32fba11256343b9fc18154
-
Filesize
4KB
MD51514d082b672b372cdfb8dd85c3437f1
SHA1336a01192edb76ae6501d6974b3b6f0c05ea223a
SHA2563b3c5c615fd82070cc951ab482d3de8cb12df0b3df59fbd11f9d3271fa2fbca4
SHA5124d41c945ce7c94746875b0dbceb14811d4966de4e97fe047406a304162fde7e1e2a16367fc2e43978e2e5aa66749f036b4444aa2312673c2cc3af296e8b77f55
-
Filesize
4KB
MD58958371646901eac40807eeb2f346382
SHA155fb07b48a3e354f7556d7edb75144635a850903
SHA256b01ec64d75fd1fbd00fbeb45a3fb39244911a8b22bb43de4e0c03f205184f585
SHA51214c5dbb017822336f22bf6779ccd4a66604ddc5f2c3caa24271e96f739fef007754d96844efa422d6682cbcd2d3bc902c36f0f6acb3eb87ed8d7b3f885973554
-
Filesize
5KB
MD57e1d15fc9ba66a868c5c6cb1c2822f83
SHA1bfe9a25fdc8721d7b76cecb9527a9ba7823dc3d7
SHA256fc74e26a8baabbe4851109512d85173b75dbf7293d41eb3b92a1957a773c8265
SHA5120892be14a858cc860766afb1c996b2c355108a7e50971ea3ec00d15069e919a6eb05a61fa839bea3938492c391e274144c5e248f4c204a602bf36adf27e5b406
-
Filesize
4KB
MD5202b825d0ef72096b82db255c4e747fa
SHA13a3265e5bbaa1d1b774195a3858f29cea75c9e75
SHA2563d1399f5323a3ece1b1a8b3b31f8fd7f50c3bd319ab3f1c38c6e347452c95314
SHA512e8fc7cc09f431301d22a07b238179ee053505090e3c4db30ead061513fe7159f1fe8b80efc93f4597fe00f01087bbe0bb2231e13693d72c8def138657cb91566
-
Filesize
4KB
MD57913f3f33839e3af9e10455df69866c2
SHA115fa957d0a6a2717027f5b35f4dbe5e0ab8ece25
SHA25605bc1f4973c6d36002ac1b37ce46b1f941fcb4338282e0ec1ec83fb558d1a88c
SHA512534e541757d19ee157a268bf7ea358b48015f400542fcfa49cdb547cd652926160f015fe2cf026d9c4996e56ab90ca3899dfd457997d915bf6bc9d7bb00ba804
-
Filesize
4KB
MD558e0fcbee3cca4ef61b97928cfe89535
SHA11297e3af3ca9e4fe3cc5db78ebbfa642e8a2c57b
SHA256c084a68b65d507eb831831aa2ab9afb9536cb99a840d248cc155ff87fad18425
SHA51299aff0c481e34cd0e4fcbb2af471afb56d91aa11be664462b08e17ae169ca03ef77e7063b4ecd0f38ca7b2f6dc0bf2e316c7b31dffbbcfc763cd8fae27dc78d2
-
Filesize
4KB
MD59b0b0e82f753cc115d87c7199885ad1b
SHA15743a4ab58684c1f154f84895d87f000b4e98021
SHA2560bdeee9fa28d54d384e06ea646fbcfe3f06698a31dfdc1a50703ffe83ad78d32
SHA512b7780b82fbe705bc8e5a527c011eb685c99ef0b2eb810617b9f82b891341af95ef1c2f46dce9e458c0c4dcc3e7a0d21db6c77f03419cd1c4b521a9b72f9017df
-
Filesize
4KB
MD5eb8926608c5933f05a3f0090e551b15d
SHA1a1012904d440c0e74dad336eac8793ac110f78f8
SHA2562ed2b0d654d60e0a82b0968a91d568b775144e9d92f2b077b6da75f85ad12d04
SHA5129113c42c38836f71ff0cc7019aff8c873845f47fbf1ab97e981cb038f4d8495b6df784402b1ee9666e8e567ae866b0284c81e6a16efb47131d5ef88569c4843a
-
Filesize
4KB
MD56367f43ea3780c4ee166454f5936b1a8
SHA1027a2c24c8320458c49cd78053f586cb4d94ee6f
SHA256f8d1972e75a320344e3c834ba0a3a6a86edb39e20ef706bda9b7965d440d1998
SHA51231aab33e0d272cb43a8c160b3d37256716a683e5052192fd0e4d3cdaf30a10a9afa9d26d5d14ad216ee455627c32892a711d2bc137ee7a7df9a297f001a19e32
-
Filesize
6KB
MD5e04ad6c236b6c61fc53e2cb57ced87e8
SHA1e9d4846b7e6cc755ee14a5d3fa45ee7d3bf425a4
SHA25608c775efa77c2a92d369f794882e467b6e2526e61bc7aa7724f48e174524502e
SHA5120dfb7e6d811d649103499018f3d115c542fcaba420ceb69124a4d837fe162ce514e7be2040860c5ef5f9c01c961fa6eea8730606b73ec107d87597989b6fd331
-
Filesize
4KB
MD556dcf7b68f70826262a6ffaffe6b1c49
SHA112e4272ba0e4eabc610670cdc6941f942da1eb6a
SHA256948cad1bb27109e008f2457248880c759d3fa98b92c5b4033b94f455cb8ac43f
SHA512c3fd9caf0bd4c303a7cc300faada9cfe6dd752e82d67625b31f4c0c2c091596508bb477fe19f758fdf79b25b8ac3f5320a8785d2b6705b9bcc28a054a59454e2
-
Filesize
4KB
MD566456d2b1085446a9f2dbd9e4632754b
SHA18da6248b57e5c2970d853b8d21373772a34b1c28
SHA256c4f821a4903c4e7faea2931c7fb1cf261eba06a9840c78fdca689f5c784c06c4
SHA512196c2282ba13715709ece706c9219fe70c05dd295840082e7d901b9e5592e74b1bb556782181cdbe35bd1ab0d6197fef67258b09491fabc6f27606dbed667d49
-
Filesize
4KB
MD5b2248784049e1af0c690be2af13a4ef3
SHA1aec7461fa46b7f6d00ff308aa9d19c39b934c595
SHA2564bf6b25bf5b18e13b04db6ed2e5ed635eb844fc52baa892f530194d9471f5690
SHA512f5cee6bba20a4d05473971f7f87a36990e88a44b2855c7655b77f48f223219978d91bcd02d320c7e6c2ec368234e1d0201be85b5626ef4909e047e416e1a066c
-
Filesize
4KB
MD5194a73f900a3283da4caa6c09fefcb08
SHA1a7a8005ca77b9f5d9791cb66fcdf6579763b2abb
SHA2565e4f2de5ee98d5d76f5d76fb925417d6668fba08e89f7240f923f3378e3e66f6
SHA51225842535c165d48f4cf4fa7fd06818ec5585cc3719eff933f5776a842713d7adb5667c3b9b1a122a1152450e797535fc7a8e97ebdd31c14b4d4900a33ede01f3
-
Filesize
7KB
MD553f7e8ac1affb04bf132c2ca818eb01e
SHA1bffc3e111761e4dc514c6398a07ffce8555697f6
SHA256488294b7faff720dc3ab5a72e0607761484c678b96d6bcd6aad9ee2388356a83
SHA512c2e79c2505a6fd075df113ffce92ad42c146424ca39087601daa4ed15a2b5528d478a093921d9d8a738c7b6b963275a0693ebe526b6e2135d14ced03639d0e70
-
Filesize
649B
MD5c44193959188526ce537c3578fdf1c17
SHA157f877be96a4e9120a03b80da67263c42b823962
SHA2562023d23c2433d65ed9fbf17acfec0ac566e61be4babd0afd440993758e4d749a
SHA5126bcfe992ebffb1c9d4bfdf6f65009811261b9469aacd99ced4e7c25d48001ade12d11d6a52c9f6c50e4d994758c9b37b3c9b9f47acbbebb1db578df3791cdb66
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
Filesize
168B
MD503e84ff244e7b661a5860647f3262442
SHA10a4f7fb7874d8f4d627a3d4b2c46ee8ef6e90e73
SHA256df8c4061c00d254d4adbf905f5b29eff3ee7d887a5cf7172cb0311f84b8b6209
SHA51234df5aea246b5575dc1e6f92a111bfaaef005a99624dd2804796fafbc1085c0bc0841a9a0b806a5a0d4c37a1abae53425dd81c93f6941ed7cc5fed58c4805f77
-
Filesize
1KB
MD53fa140e80acbcd76b6790873f387fc2c
SHA1d6b59923184c96927fe13ae8e1db21bf449942af
SHA25606d4f63ee45b5f7cac6619b527147c995efddfec0655b3d3b211e4da2044911c
SHA512d961f4f8e1d4941b8d91c8d003b7e15c0cde3d46a428b879216052309effc41fb436394bf79c0d091c225b0f4717dd44e2d3d2100c52dddeb31fb6d5793d3384
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
4KB
MD5becf7c0655992f0ab06f022ee667cfa8
SHA13821d674ec2f66ac116351b74de620341d3831dc
SHA25623ac7f701b740b3c227e981af6cde55c9f50423146feafbbc6bdf26981efb236
SHA51284b4c0ca766fbafc9e2ba8bc13cf8456d7306d12f3b884424a11515a8fe08589dd0c2400b31b3668519407d3ef73a9c5d7f0bd4fee75ead646baf1d20e217424
-
Filesize
4KB
MD54367bf992bc9c3b2578171c97b4ffc09
SHA180f4e0b02a575fc62b32987e5ee68bbc396d2705
SHA25698b1e96af64a247e7ac4c03a58ae605b071b3e08e31ad645efe6c99bac413c9f
SHA512134a08b7f2561cdec8452fdf4aedaf5792b1e0c11384f9f769abf0198bd6b8b50228f9dec960aa9022059f4a0741cb2a839057c375c455c0ffcb30152319da7b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5e47ba45781cb6016b6d50030cde9ed40
SHA12447cce815a2949c4bce48e1c8c9552afb2d5773
SHA2566a8c8b8f797441c43dd5ccb60c4d8d126ce14edf78aebc2ab15e683fea2880a0
SHA512ed733d7a44b4ebfeec7deb023ef4635413979602eeb5b2de6c6cb1d06193d9adc697c7f223ae569154af95e551728ee4ae6544ff232a2b9f2e35404565726c08
-
Filesize
356B
MD54b43b4fe55e74816f9f94dea8a6930cb
SHA163380e6c459a87a39f51d17a3f3fb7abc25fb54a
SHA25636904ce9a32e2ddda7866dd4c2e4f29c41fa2ffd10190944a18efa0c2007e647
SHA5128b338539b855ce2c82e8762216cbbee1e4e4e99d60f2ff28f1bcd205051d3b44b5bae2a1b05296fe9cd476bf023d800d7ac5bd59610e2de7fd5cef0dc099c73f
-
Filesize
692B
MD55f0086bdc64784093cdcadfccac2a410
SHA1165d000e7ac94649ee828310d71020283da59405
SHA25671f43770ab956bfc2dcf780aaeb30542269424337839f95c112cfe43caf23815
SHA51282236f9562ffcbeff7626a22569629686aec17edd67191952298908a6cd8ade48bb2bd953b3eb9daba4427ea6f939065491a90d56b38ac8af66b9055cf40d9eb
-
Filesize
10KB
MD541b65748ad0c5c1c65eb3bc3b7683eb1
SHA17a7e833ec813806333b100a7c86f42c671a7c49d
SHA2565270850d2f35ee9b2cb9b894ef5ef5185b659e53ce52e05664e505be0ba365d8
SHA5124a3f446f83b869c8e85a202cea17ea3f48f1e6a3ea653a6e31dd32ca3a16ab62a72124f9e48b4fa732efecc8a18c430bc3e8e7a91a04a958826fa14373d9d583
-
Filesize
10KB
MD51dbe94532a4676c3e263299bbe6cef24
SHA1fdbeb51ee32fc7dd34995cf929e5b95202fe2668
SHA256a110f51b0e42371bddfdff37445cb3a0528864be6b6bf57efbf5d7fd56ed0b41
SHA51219fde1dce714c0ffd2129eff18707ddb9fab761e4aa69f257e85fab87c6553c3e0b832ecc32b5c32e538d3d83a181fc7194365a12ac707808b1052b6f2b5c0df
-
Filesize
10KB
MD5864fb844b0de5d00058031dd8478bf73
SHA132edd17dc6e0f1713650e390489b7c1d25e1add3
SHA256ceaef3d175022ff961323d16c7ed3076cca2c2ba577ffe56d8b54d5c758201be
SHA5122e6dc14ac416c906b14171c051ef0e97eac58203054870ecb9a40932a3c14200ea001f76b3008cde121bc9f70533e7d5d2f211579a0b3e1f78a6d44f07b1ba08
-
Filesize
10KB
MD53b38fd80c5b765ec11600eee4e28b250
SHA1a8d3bfbe6fb983592d7c4bf3a51781002ea35a08
SHA2569ddcc36958edc95baee9a47ab6f239015e18c036ce307da6bc97f369535a4f50
SHA512a1b510c5097e3a4b62c0fbe967ba256e39ec277ee60e90e7da3bb0e071711116e1dec793e04f733178970f20403231f072a83ee3112ad55c5d0d2ad08d200d60
-
Filesize
10KB
MD50503a8301440286b6d943210fcae4622
SHA149759ee6136581fc1b071b2b80b237b7fa088434
SHA256e2b57a098354284a9df75252f6a8e61bbcc99245055dade9953f30cb90283d9c
SHA5124b89c06801f227eca7cf79c9c9743facead288550c611d76b41d2b7b95fd8bb394effaea59767e082c78d406e25e2a884e4ca382baacf18e8cf65f1efa449ad5
-
Filesize
9KB
MD50d4dfe589cfa508db3f1402b394cf7db
SHA19c657f5e0818e3d4d8848f31197a7acc0b496eb6
SHA256629a995e0ead624273f15b82bd579a19dd2729136d87b048cc86e009c2c8bc5a
SHA51202e23c2c6bfcc93323136e6cfe3d6a1bd9b3c510a1a3545ced95c56e59e99f7bd2f7c2116916a7c2961de9c7bfc8faca1bdeb6432ff8e2210f316bb24189071e
-
Filesize
10KB
MD51f8dffa5cdea0afde66550fcb5382e84
SHA1541f8708ec0c6dcb186516750b7330fefde79d86
SHA256cc19473f45fb167b95ec5ec0e44831d8346695ac95344edf3fa2c7de229b2da6
SHA5122be1daf4e80ed5ce17301d8b3536cbe15e286169173a2587d5f483a641807ae2ff57af72c13bc4d34a762baf6f656dd8ac18bf34428a1495240a2529ac01111e
-
Filesize
10KB
MD526afc8f958d151ba12e21c1e0a8bf55c
SHA1132ad5d20ba0dfa1f84cbd2b6f50ed14da860804
SHA2560e605c8fdb7bdb686e401bd5754061f00633b4fc61f4da9aa06132dac0c954ae
SHA512fb80b16228755708a580eb449adbdb6c470184cdafcfa0a9203ebdade3ac51df5ac96578d778661de805b8e51a4b216480bb9d74e39f4ba111cc4a019602fae4
-
Filesize
10KB
MD56d307999ea2944b6160215e8a0be6586
SHA158f24e0de0384c8b35dbaac006fe65f196e5b4f8
SHA256e5c87b74192c53630b34f6007d50992c1bfa24e4dd1e73f8e8ea2a98647bd846
SHA51246fbd95d10d74106bc430df1afa95bcc0e045e3d3fe8bc524e14ad6f8aec02b0be236d1bf29e5415a1ad0350055717f2c63d16c0c213aa7f9e23dc2aec7e041c
-
Filesize
10KB
MD58071729a95f814ced7abc4f9273a3037
SHA12925562c7e5c0496399ccf366868bc1a808768b2
SHA25601ef2718cfca4589dfb41cc5b5311c2a0367aab652a651837eee5b8dd4599c7b
SHA5123346ce1ff57fd1d2df4429f30a52b5967038feb0fc0215a67af3493d010f52fe32801df28497df9144ef1d02b53beff4665a61a4bb398832a77f6f2189c66191
-
Filesize
10KB
MD548fafe591f3415ce13d973f141fc0cac
SHA11075462f0100fbd91d7689807c1844bb008780b9
SHA2560d03e6e3f158c3734d457c7f5548b510c5042621f721fdaaf6ab346d7ffcea2a
SHA512dc39f8e6e2346d26b4c788cf374c5c9416d22d42d1787d6b0658ad9b29e99410b22351aa3c7f8dec480c08c6172a0972333899e64606d39f286e2c49bae2eb3d
-
Filesize
10KB
MD505b544053e65369bbc82958431876e2e
SHA1cbb5aeb91f4b2228879861f248e212be5ac4c77b
SHA2563e1e233cdea529d78504f43af94ba0679e24bce3c439fffa48e4e5ba3ec06621
SHA5128dc74c4a022addabc1cbae145b555ebc1124d6b9d657ef77c0e1b3d2b7ad8c076eb29b513615fb29f0a2047e5f5020e469dad0684d37842b00e19f1907ebcc4a
-
Filesize
9KB
MD5a504f75803316661557b66f1181326a6
SHA17e36d8742192e77b27442302eb309351ea895b5e
SHA256dbefc5484b13b3fe9f97424d1e0d3bac62a3afba942827e452ec5d3e1015a4dc
SHA512d68a68f73c2cc92b4b5a60563034692de8e475a8aea4cc362a84b43426ac7b405ced3d6a8363451ad71afac1af125f5f61de3564769a37511574ed6b8fea1539
-
Filesize
15KB
MD519359f92efd5e001cf695744677fd273
SHA1476a2fab9ef15b66d0f015491573dfe1278a0e7b
SHA2565510129be663d35fae4def4884de18f8d1779511927ae772706651b902d5a031
SHA51259145a6d1b608f45b620782a459ae792c61ab122e9d6b39ec6d9eb9400a55775bae54ce504f81e358a90af2a8ca5b614f2215108d4af3212a769648b9d37f8c8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5317ea7e87763a916084f3128c1d523d9
SHA1b7611ba2116397396f20f172ae95867b6df6a869
SHA25605ed8b6460ea6a91a4a7f3b1ed89f04ae5722d1e5d380405887d3f7d93be2250
SHA512a21592fed7f34780363b9d670070ce1538f423d10a915a776f0a8ee480f4bc1102999ee9a84f40ccb69dcc8c7e5c6ee84c03488092781ce3f49fdba7a932f1a4
-
Filesize
231KB
MD506c681057f10058ebd2ebe6da78797f3
SHA1fddc35cca040ec670f9a8256a109da40c31d366a
SHA25675592ba988ce8a4d02779a23982b482a6943841474390079a03f2ecd37f11272
SHA5121242e27e6602af8be0f22e4880fecddfdb40262a05a5502b8f6a0e623f9ebf29ce46780f1c646c402c3dd4be13526a2ece94d61c2e4c0b5867dd11fbe844a665
-
Filesize
231KB
MD5160ab6ab89e8e4dc8c099101738d2b3b
SHA1a0d76a93ddc45a0abdd832183fe3c3426ddcca54
SHA2561b84018b3c9db62bfde7b7752b204a5b72a6b73ac02711a597a8ceb993bc86f9
SHA512212e20cfac4049709e63728937ff70a2018b76132d4d357470dd99c8405f19ee95956798eedfdfd51b4c687a74878a127ac93e51743deceefb8bc7c43078783a
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
152B
MD5a67f33cc2a7d8c57f9392c2536798076
SHA1861e263c10af37bd1ffa563b3086f00bccd658f7
SHA25661a545ab611ee7f0e57e9d95cea4f5f742299101a8f5e8d84e650b28bf8536d6
SHA5125cad21228068a85cab6acca188e8b8505635ad1dda02f3ea9f2c117eabd2ed2f4b18aa8950093ae4034b0daccc6120b3c5b84beb1bd7a048885e8f0ad4800a80
-
Filesize
152B
MD55e887d921f65f80e1904499733b5779e
SHA147169d68b3c5bc6eb0dc0b694153d395148f626a
SHA256a4a5079280ea3e5f43d0177f6bb975acac175311d0eaf62f615d2daffe039d7a
SHA512700f68d214a5343f52821ba456d44ac8783fecb451fa652dfe0556089984b20fa02b2c146c3bc31ac457d48628e7d2b394712f912a3f9e6bfd29a27eb3e209f2
-
Filesize
152B
MD5e389a2348f4d2ba0068643c813622e8a
SHA1f87baca8d1414342a8edf8a0f7837f67c5f446e2
SHA256a85a233c9acfa5a68cdf5b02f17c9e5f3f83ff449f8e8f283be8d6ed6c20b98e
SHA5126aaecd3141b4a0b307394e4ef208d88a6971884295d1cb39cd0a4af5e69dcd609656d48529ee14ef058104ef36a637e68968763bc5df4bf53ef9cc3e2ab42c99
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5a9f3aca6d01b8864d2e0cbc151c1b935
SHA168647a4e22ec00f06b7965cf42242d6535067369
SHA256354c248cb17fade2b853cf656de97b7f60f1e4392f5dbeea205a723925a855e8
SHA512ae9c17b6050556daba4394fa303de91ec1e8e1987959e3353eae801b68b738812b6a5afc8c8a9130f0ceb51f295afe3c45c748f361c3d305d4e2937fb96ecda7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e545b9d48e1715a5d75608f2177326d9
SHA15959f3325de10a012797aec4fc24b6d99b156613
SHA256471282d190aafb0ef830af36c9224520a904e23653f7a24dcfce9ca727d5e044
SHA512c1b90d3b922106381f45bf39d132965ee94d3a2db7ef9a1c73339c0071e152e78c214f1b9a79b7e6fe6971b46818450c7b96b922a6924607da7051d5f1930d8b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
456B
MD53982504be304bd4580f7546c08d45468
SHA1e5faa479a0a6875ee62941c1baaf0f651959b6ec
SHA2567757b5e1102384897ae48ec068420d6dd8e829f726d8967fce9fe7369219fe78
SHA51202e201b513f6f898cdcc71b40838bc80ab7795aa140c8ec0bf0a6391cdbb05a6a50511105d8f80c1accde7b3174b9c3729d1fa1ccc17c210d33155aca850f5ea
-
Filesize
456B
MD554b63b03efcb006f53a2de6b10350f99
SHA12d74a9b05041e1002f4d60f9a595a275b42285fd
SHA256a678656e7d9393c2ce7ab60fe524e2f4415b5ca3242fc9b595280b49317137a3
SHA51261da43ccd72c8113ba7eae55cd445c8e3f00ea067857f56f1342f344e0f164d90b97079e95fe463e8f0698f381bf5111c4fdd343b6a8a782d609678aeff052fa
-
Filesize
247B
MD594bd83393ee4e3c749f28c3414160cbc
SHA168effb04ecc392f2ae4ad7bdc1e99b9116da474c
SHA256e1dbf44fca250f32925910fcd7f59276e46d0d916eff30fdf9f85ef91bcd3d4b
SHA512203109a405cd685a195e6cdae5d0a624abcd6c6a9333b88f312e50f96bafa03057366bd78bf62df8784ec97f14677d56f8b78b472000044618a784bcf7af3e8a
-
Filesize
6KB
MD57f66b137a2040eb3f496c5e9d17d5766
SHA117c5c70e5cf6047d5adb290e3c4a9eefb762e381
SHA256aaeb7aa35dc9609d40edebe1fda5323646383e76d9e019a3669b68d61b869ac9
SHA512b72c73462b6f0919c0478cf1b57601218ca97aaeefb7465077d000df6c8b6f223d5856e9588dd7dfbdc77ec1bc5d4ec7fa5a7341ef5bffa59fd63e990c59e864
-
Filesize
6KB
MD55dd75fab8357aec3814ebd2ce99380b2
SHA1228076fecd421cee7a1ffc40e2873706a40d0d4b
SHA2562f4be728f40dd95da2bf4e2d6280a06ff411752df8540537af2b005970066cf6
SHA512db885916ebcb051952ac114d300f63d52ceee4d6d8928b35af6fc46df95c4f0d876911f9121aba022cc85c2d8e8b01bf6e5f33126ea0ec5ae45790244b4b5209
-
Filesize
6KB
MD5337c16095da0378fa5566b8dab3659a4
SHA1ddeb6ea9215ff6a41b3d3a28e6b1b4cffc0d7f98
SHA256d4d3443070c1c43e8e5a0914299cedf33e375421bab9fec52e686d1e938aa5a0
SHA512db811835596f74162f5fc071f705a8075144b471508b0ce7306210880d29d002ff4c664d3b9443738adffa1e9d22fa0b746336688366754715cb13e09a548a96
-
Filesize
5KB
MD5d4a5f18087d52209b62db080ea8b572c
SHA1686a9205701e063daaba571dfdb66845a0cc6e41
SHA256b63af9d28151afa539a4fc36389b52ef526370954cff8677aee0cfbd60a6352e
SHA51280d2d9bc8afcac3f43e654ea6bf11b11d03aec1cdb05a7c6af36cbfb179307d5ad23799f814db383451490a7b8ed18229afb79f57a0d6749624aa9681d30bff9
-
Filesize
6KB
MD5dd9e6cf76ec8279a0221bcade8a14381
SHA1455044cf61039f29c41e85a66977c75db787a3c3
SHA2564fa29572f8e588e8d380681729ac46b230a247eb8f5b1b78f545f5c5f58b914b
SHA5127954c98f094c0285a578458d4e544f2001744efe99164d7c744c91018b9f47ddc7c5e87295a21b58c6ab7c0aefe73ddd3dd486e1041a02ad39a9d595cc204a70
-
Filesize
6KB
MD500ee2d9b1a6b7b4316909bcf563e17d3
SHA1068a23dde53d08bb4f230c437405675c0a446a67
SHA256482aeaab5b9e631aa8aa2c90bf644fe48a8abbe85ee172b9e49844c211df183f
SHA5123fc4bd975f32e1417509e2ded8a010925299667f4e46750e93666ed520f3592f4959792f0901591ec5badb9afccca986f8be95a724b5121b8be4f430ab04f9d1
-
Filesize
370B
MD522fcb2fe176acb8d3383c3d01e0df9ba
SHA1942ad842cda616d5a810537c36c5fcc4421a1168
SHA256e461898d091bcf6c5f7de29574d47ec3e396d7c8792fee8a03a78f102cdddf44
SHA512449c1c2041482cbdbc8f420143baa1a87070fa9fc1c47ba42365c7d952783a38cce137000be857ccd34ab23661e7b40dfcbd13194047ceb05510e26e7d8f636d
-
Filesize
370B
MD548329743f49385d8de07479e1121dd07
SHA1424e9d1100d46c6d602052338c1b53453c6ae718
SHA256c8c3a25276ea7e908b94decd0845ca4f05cea7201fecf7984d0719a8cf46712a
SHA512b71c2bd9b9e4f654f7dae13c2ad31de20ab2daf90391e892c6ba0c31366a8d828e2d69c01f1dd587f934fa158b581954472fcd818b50ee83ce227206fdd2b180
-
Filesize
44KB
MD50281af81660292757b19a82cf09d54d7
SHA1e021d69a352027a55b03d0f82e1c1dd388f84608
SHA256a47509cbc56e1700c48faedd40445dfa5dd3559976b8154a74f5d441410a0d4d
SHA512fa4cdce84539798850daed25258762fa5dcd4c90462019af16fb93636ac5d1d6a416a542a4282faca70cb51618ec407362c10821301f2e5718219ca7dd6596e8
-
Filesize
264KB
MD59c55ea426cd4e2c73e93241a8d3f968b
SHA11e56faa4b0b19aa258000c14cb31374973a8bbbf
SHA256e7b2e3997dd32408d6179bdbbc792bbe52e8b60b7462eeed05451218d1e88f67
SHA512421574d5156a8e5301f9154308c26d5a341ab4a4f0227da0753dc7d5b4765cde2f47e930c00683247b2057c7eb321129f716c2b13bc254cda10f96b618fc36e4
-
Filesize
10KB
MD5870defb23d4e9ed596e1c50812167671
SHA136fbd9f9347f28ee1ca62a92e4c58cdc13a03c18
SHA256d294cbd2224441996542bd1c16e69e5f1390492721211566eba0356da0f537c7
SHA512cb088303ff58796c85f6b0e182d78e046c5dd697870c77ec15968da40af9f0e1833ad1196762b6b2d443c88b0af296ba7b4135788ec3149fde80509eb2e25230
-
Filesize
10KB
MD590769014b33021abec669c6908315d6e
SHA1775fd087b9d2c1ab253488cd127de6fb9e3df536
SHA25652ecbdcf4105bf00be26f32a0ad4735bc42bf6670b7da068b689701a49bdd1a9
SHA5125852fecb99522f432669f1187cdad366ad76265640f602ab6953eaba7610e8604d112527b87dbf45a62b8925d860494148542866b9438da7b17566c8e5059965
-
Filesize
10KB
MD54c17d6212bb4445aae4812f00de3e91f
SHA1fe0255910ffa88126f9216ddb8973233ae006825
SHA256ed6fb8c854e27d58e30b6137af75631d21b150de683b7fb1d9704126eba77faf
SHA5125bcd07213784037d95c3f29e2fa30c02ac0c2373ad69a6be4168f75558e5c2fe30a13d341ef631487d8098ffaeff5338548cb6083261071dba919eeb1c9f4711
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
22KB
MD5a36fbe922ffac9cd85a845d7a813f391
SHA1f656a613a723cc1b449034d73551b4fcdf0dcf1a
SHA256fa367ae36bfbe7c989c24c7abbb13482fc20bc35e7812dc377aa1c281ee14cc0
SHA5121d1b95a285536ddc2a89a9b3be4bb5151b1d4c018ea8e521de838498f62e8f29bb7b3b0250df73e327e8e65e2c80b4a2d9a781276bf2a51d10e7099bacb2e50b
-
Filesize
150KB
MD53614a4be6b610f1daf6c801574f161fe
SHA16edee98c0084a94caa1fe0124b4c19f42b4e7de6
SHA25616e0edc9f47e6e95a9bcad15adbdc46be774fbcd045dd526fc16fc38fdc8d49b
SHA51206e0eff28dfd9a428b31147b242f989ce3e92474a3f391ba62ac8d0d05f1a48f4cf82fd27171658acbd667eaffb94cb4e1baf17040dc3b6e8b27f39b843ca281
-
Filesize
20KB
MD54e5bc4458afa770636f2806ee0a1e999
SHA176dcc64af867526f776ab9225e7f4fe076487765
SHA25691a484dc79be64dd11bf5acb62c893e57505fcd8809483aa92b04f10d81f9de0
SHA512b6f529073a943bddbcb30a57d62216c78fcc9a09424b51ac0824ebfb9cac6cae4211bda26522d6923bd228f244ed8c41656c38284c71867f65d425727dd70162
-
Filesize
17KB
MD52095af18c696968208315d4328a2b7fe
SHA1b1b0e70c03724b2941e92c5098cc1fc0f2b51568
SHA2563e2399ae5ce16dd69f7e2c71d928cf54a1024afced8155f1fd663a3e123d9226
SHA51260105dfb1cd60b4048bd7b367969f36ed6bd29f92488ba8cfa862e31942fd529cbc58e8b0c738d91d8bef07c5902ce334e36c66eae1bfe104b44a159b5615ae5
-
Filesize
15KB
MD508072dc900ca0626e8c079b2c5bcfcf3
SHA135f2bfa0b1b2a65b9475fb91af31f7b02aee4e37
SHA256bb6ce83ddaad4f530a66a1048fac868dfc3b86f5e7b8e240d84d1633e385aee8
SHA5128981da7f225eb78c414e9fb3c63af0c4daae4a78b4f3033df11cce43c3a22fdbf3853425fe3024f68c73d57ffb128cba4d0db63eda1402212d1c7e0ac022353c
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
2.3MB
MD51b54b70beef8eb240db31718e8f7eb5d
SHA1da5995070737ec655824c92622333c489eb6bce4
SHA2567d3654531c32d941b8cae81c4137fc542172bfa9635f169cb392f245a0a12bcb
SHA512fda935694d0652dab3f1017faaf95781a300b420739e0f9d46b53ce07d592a4cfa536524989e2fc9f83602d315259817638a89c4e27da709aada5d1360b717eb