Analysis
-
max time kernel
198s -
max time network
208s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25/02/2025, 20:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/83fsf6re7xx3eto/KvNDxczSGVGHAUAz1.rar/file
Resource
win10ltsc2021-20250217-en
General
-
Target
https://www.mediafire.com/file/83fsf6re7xx3eto/KvNDxczSGVGHAUAz1.rar/file
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7705892256:AAHUeht7K5svKghzQxSiPHkYbDFUKDkxmc4/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 283 3904 msedge.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000\Control Panel\International\Geo\Nation steamwebhelper.exe Key value queried \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000\Control Panel\International\Geo\Nation steamwebhelper.exe Key value queried \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000\Control Panel\International\Geo\Nation steamwebhelper.exe Key value queried \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000\Control Panel\International\Geo\Nation ViLauncher-4.3.3.exe Key value queried \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000\Control Panel\International\Geo\Nation steamwebhelper.exe -
Executes dropped EXE 29 IoCs
pid Process 5128 SteamSetup.exe 3556 steamservice.exe 5720 steam.exe 6984 steam.exe 4504 steamwebhelper.exe 6944 steamwebhelper.exe 4556 steamwebhelper.exe 5172 steamwebhelper.exe 1576 gldriverquery64.exe 5216 steamwebhelper.exe 6580 steamwebhelper.exe 4996 gldriverquery.exe 2136 vulkandriverquery64.exe 552 vulkandriverquery.exe 7052 ViLauncher-4.3.3.exe 4520 ViLauncher-4.3.1.exe 6364 ViLauncher-4.3.2.exe 1492 steam.exe 2952 steam.exe 5580 steamwebhelper.exe 3040 steamwebhelper.exe 6480 steamwebhelper.exe 6880 steamwebhelper.exe 2608 gldriverquery64.exe 3184 steamwebhelper.exe 3200 steamwebhelper.exe 1828 gldriverquery.exe 6152 vulkandriverquery64.exe 4700 vulkandriverquery.exe -
Loads dropped DLL 64 IoCs
pid Process 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 6944 steamwebhelper.exe 6944 steamwebhelper.exe 6944 steamwebhelper.exe 6984 steam.exe 4556 steamwebhelper.exe 4556 steamwebhelper.exe 4556 steamwebhelper.exe 4556 steamwebhelper.exe 4556 steamwebhelper.exe 4556 steamwebhelper.exe 4556 steamwebhelper.exe 4556 steamwebhelper.exe 4556 steamwebhelper.exe 6984 steam.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 5172 steamwebhelper.exe 5172 steamwebhelper.exe 5172 steamwebhelper.exe 6984 steam.exe 5216 steamwebhelper.exe 5216 steamwebhelper.exe 5216 steamwebhelper.exe 6580 steamwebhelper.exe 6580 steamwebhelper.exe 6580 steamwebhelper.exe 6580 steamwebhelper.exe 1492 steam.exe 1492 steam.exe 1492 steam.exe 1492 steam.exe 1492 steam.exe 1492 steam.exe 1492 steam.exe 1492 steam.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -silent" SteamSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
flow pid Process 268 3904 msedge.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\ghost_010_wpn_0411.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\localization\xbox_360_thai.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\resource\overlay_latam.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\shared_r3_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\ps_dpad_right.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\switchpro_button_plus_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\resource\filter_clean_russian.txt.gz_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steam\cached\aboutdialog.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\ghost_010_wpn_0404.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\icon_info_sm.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\ps4_trackpad_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\ps4_trackpad_r_left.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\sc_touchpad_edge_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\sd_button_view_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\sd_rtrackpad_click_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\ghost_035_magic_0357.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_035_magic_0357.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\icon_vr_disabled.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\sd_button_aux_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\shared_buttons_n_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\SteamFossilizeVulkanLayer64.json_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\bin\service_current_versions.vdf_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\switchpro_r_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\sounds\deck_ui_hide_modal.wav_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\ghost_050_menu_0150.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\switchpro_lstick_left.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps_button_triangle.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\shared_dpad_down_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\bin\cef\cef.win7x64\locales\hr.pak_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\ghost_035_magic_0312.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_060_vehicle_0080.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\localization\friendsui_schinese-json.js_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\localization\xbox_360_ukrainian.txt_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps_outlined_button_x_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\shared_outlined_button_a_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steam\cached\DialogCheckForUpdates_Expanded.res_ steam.exe File created C:\Program Files (x86)\Common Files\Steam\steamservice.exe steamservice.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\ps5_trackpad_r_down.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\sc_touchpad_down_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\sd_r4_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\shared_outlined_button_a.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps_color_button_triangle_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_040_act_0330.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\shared_mouse_scroll_up_lg.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\ps_color_button_square.svg_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\sd_r2_half_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\ghost_035_magic_0353.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\icon_meterOff.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\shared_gyro_roll_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\friends\friendsrefreshlogindialog.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\public\LimitedUserDialog.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\sounds\confirmation_positive.wav_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\tenfoot\resource\images\library\controller\binding_icons\ghost_035_magic_0321.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\steamui\images\controller\ghost_040_act_0325.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\dark\ps5_trackpad_l_right_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\shared_dpad_down_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\light\switchpro_lstick_right_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\resource\1_star.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\ps_button_square_md.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\images\api\knockout\shared_gyro_yaw_sm.png_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\controller_base\templates\controller_neptune_touchscreen.vdf_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\friends\TrackerDialog.res_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\graphics\inbox_async_game.tga_ steam.exe File created C:\Program Files (x86)\Steam\package\tmp\resource\vgui_sc_schinese.txt_ steam.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp steamwebhelper.exe File opened for modification C:\Windows\SystemTemp steamwebhelper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gldriverquery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vulkandriverquery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gldriverquery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vulkandriverquery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViLauncher-4.3.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViLauncher-4.3.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SteamSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steam.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steam.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steamwebhelper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steamwebhelper.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steam.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steam.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steamwebhelper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steamwebhelper.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 43 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\steam\Shell\Open\Command steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steam steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steam\ = "URL:steam protocol" steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steam\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steamlink\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\DefaultIcon\ = "steam.exe" steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink\DefaultIcon steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steamlink steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\URL Protocol steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\URL Protocol steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open\Command steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steam\DefaultIcon\ = "steam.exe" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steam\Shell\Open\Command steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steamlink\URL Protocol steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\DefaultIcon\ = "steam.exe" steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steam\DefaultIcon steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steam\Shell\Open steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steamlink\ = "URL:steamlink protocol" steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steamlink\DefaultIcon\ = "steam.exe" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steamlink\Shell\Open steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steamlink\Shell\Open\Command steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell\Open steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steam\Shell steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steamlink\Shell steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\Local Settings msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\ = "URL:steamlink protocol" steamservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steam\URL Protocol steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\steam steamservice.exe Key created \REGISTRY\MACHINE\Software\Classes\steam\DefaultIcon steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open\Command steamservice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\steamlink\Shell steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\ = "URL:steam protocol" steamservice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\steam\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\Steam\\steam.exe\" -- \"%1\"" steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steamlink\DefaultIcon steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\steamlink\Shell\Open\Command steamservice.exe Key created \REGISTRY\USER\S-1-5-21-3524754987-2550789650-2995585052-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 308443.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3196 msedge.exe 3196 msedge.exe 4532 identity_helper.exe 4532 identity_helper.exe 5212 msedge.exe 5212 msedge.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 5128 SteamSetup.exe 1632 msedge.exe 1632 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 6984 steam.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 5476 7zFM.exe 5476 7zFM.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe 4520 ViLauncher-4.3.1.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 5476 7zFM.exe 6984 steam.exe 1492 steam.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 25 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeSecurityPrivilege 3556 steamservice.exe Token: SeSecurityPrivilege 3556 steamservice.exe Token: SeRestorePrivilege 5476 7zFM.exe Token: 35 5476 7zFM.exe Token: SeShutdownPrivilege 4504 steamwebhelper.exe Token: SeCreatePagefilePrivilege 4504 steamwebhelper.exe Token: SeShutdownPrivilege 4504 steamwebhelper.exe Token: SeCreatePagefilePrivilege 4504 steamwebhelper.exe Token: SeShutdownPrivilege 4504 steamwebhelper.exe Token: SeCreatePagefilePrivilege 4504 steamwebhelper.exe Token: SeShutdownPrivilege 4504 steamwebhelper.exe Token: SeCreatePagefilePrivilege 4504 steamwebhelper.exe Token: SeShutdownPrivilege 4504 steamwebhelper.exe Token: SeCreatePagefilePrivilege 4504 steamwebhelper.exe Token: SeShutdownPrivilege 4504 steamwebhelper.exe Token: SeCreatePagefilePrivilege 4504 steamwebhelper.exe Token: SeShutdownPrivilege 4504 steamwebhelper.exe Token: SeCreatePagefilePrivilege 4504 steamwebhelper.exe Token: SeShutdownPrivilege 4504 steamwebhelper.exe Token: SeCreatePagefilePrivilege 4504 steamwebhelper.exe Token: SeSecurityPrivilege 5476 7zFM.exe Token: SeSecurityPrivilege 5476 7zFM.exe Token: SeShutdownPrivilege 5580 steamwebhelper.exe Token: SeCreatePagefilePrivilege 5580 steamwebhelper.exe Token: SeShutdownPrivilege 5580 steamwebhelper.exe Token: SeCreatePagefilePrivilege 5580 steamwebhelper.exe Token: SeShutdownPrivilege 5580 steamwebhelper.exe Token: SeCreatePagefilePrivilege 5580 steamwebhelper.exe Token: SeShutdownPrivilege 5580 steamwebhelper.exe Token: SeCreatePagefilePrivilege 5580 steamwebhelper.exe Token: SeShutdownPrivilege 5580 steamwebhelper.exe Token: SeCreatePagefilePrivilege 5580 steamwebhelper.exe Token: SeShutdownPrivilege 5580 steamwebhelper.exe Token: SeCreatePagefilePrivilege 5580 steamwebhelper.exe Token: SeShutdownPrivilege 5580 steamwebhelper.exe Token: SeCreatePagefilePrivilege 5580 steamwebhelper.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of SendNotifyMessage 54 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 4504 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe 5580 steamwebhelper.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5128 SteamSetup.exe 3556 steamservice.exe 1404 OpenWith.exe 1404 OpenWith.exe 1404 OpenWith.exe 6984 steam.exe 1492 steam.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4776 3196 msedge.exe 84 PID 3196 wrote to memory of 4776 3196 msedge.exe 84 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 2680 3196 msedge.exe 85 PID 3196 wrote to memory of 3904 3196 msedge.exe 86 PID 3196 wrote to memory of 3904 3196 msedge.exe 86 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 PID 3196 wrote to memory of 2760 3196 msedge.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mediafire.com/file/83fsf6re7xx3eto/KvNDxczSGVGHAUAz1.rar/file1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffcd81846f8,0x7ffcd8184708,0x7ffcd81847182⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Downloads MZ/PE file
- Detected potential entity reuse from brand STEAM.
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7044 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7216 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7236 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7068 /prefetch:12⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7624 /prefetch:12⤵PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7572 /prefetch:12⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7768 /prefetch:12⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7672 /prefetch:12⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:12⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7604 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7872 /prefetch:12⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8080 /prefetch:12⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7884 /prefetch:82⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5212
-
-
C:\Users\Admin\Downloads\SteamSetup.exe"C:\Users\Admin\Downloads\SteamSetup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5128 -
C:\Program Files (x86)\Steam\bin\steamservice.exe"C:\Program Files (x86)\Steam\bin\steamservice.exe" /Install3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3556
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,3868460836086824805,8550100302777808150,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
-
C:\Program Files (x86)\Steam\steam.exe"C:\Program Files (x86)\Steam\steam.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5720 -
C:\Program Files (x86)\Steam\steam.exe"C:\Program Files (x86)\Steam\steam.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6984 -
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" -nocrashdialog "-lang=en_US" "-cachedir=C:\Users\Admin\AppData\Local\Steam\htmlcache" "-steampid=6984" "-buildid=1738026274" "-steamid=0" "-logdir=C:\Program Files (x86)\Steam\logs" "-uimode=7" "-startcount=0" "-steamuniverse=Public" "-realm=Global" "-clientui=C:\Program Files (x86)\Steam\clientui" "-steampath=C:\Program Files (x86)\Steam\steam.exe" "-launcher=0" --valve-enable-site-isolation --enable-smooth-scrolling --enable-direct-write "--log-file=C:\Program Files (x86)\Steam\logs\cef_log.txt" --disable-quick-menu "--enable-features=PlatformHEVCDecoderSupport" "--disable-features=SpareRendererForSitePerProcess,DcheckIsFatal,ValveFFmpegAllowLowDelayHEVC"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:4504 -
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=crashpad-handler /prefetch:4 --max-uploads=5 --max-db-size=20 --max-db-age=5 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files (x86)\Steam\dumps" "--metrics-dir=C:\Users\Admin\AppData\Local\CEF\User Data" --url=https://crash.steampowered.com/submit --annotation=platform=win64 --annotation=product=cefwebhelper --annotation=version=1738026274 --initial-client-data=0x28c,0x290,0x294,0x288,0x298,0x7ffcc6a3af00,0x7ffcc6a3af0c,0x7ffcc6a3af184⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6944
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=gpu-process --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1738026274 --steamid=0 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1564,i,4675871794358133903,6544015189393262517,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=1568 --mojo-platform-channel-handle=1556 /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4556
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1738026274 --steamid=0 --field-trial-handle=2172,i,4675871794358133903,6544015189393262517,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=2176 --mojo-platform-channel-handle=2000 /prefetch:34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5172
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1738026274 --steamid=0 --field-trial-handle=2952,i,4675871794358133903,6544015189393262517,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=2956 --mojo-platform-channel-handle=2936 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5216
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=renderer --user-agent-product="Valve Steam Client" --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1738026274 --steamid=0 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3316,i,4675871794358133903,6544015189393262517,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=3320 --mojo-platform-channel-handle=3312 /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:6580
-
-
-
C:\Program Files (x86)\Steam\bin\gldriverquery64.exe.\bin\gldriverquery64.exe3⤵
- Executes dropped EXE
PID:1576
-
-
C:\Program Files (x86)\Steam\bin\gldriverquery.exe.\bin\gldriverquery.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Program Files (x86)\Steam\bin\vulkandriverquery64.exe.\bin\vulkandriverquery64.exe3⤵
- Executes dropped EXE
PID:2136
-
-
C:\Program Files (x86)\Steam\bin\vulkandriverquery.exe.\bin\vulkandriverquery.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:552
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1404
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5476 -
C:\Users\Admin\AppData\Local\Temp\7zO4659B0A9\ViLauncher-4.3.3.exe"C:\Users\Admin\AppData\Local\Temp\7zO4659B0A9\ViLauncher-4.3.3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7052 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\234.tmp\235.tmp\236.bat C:\Users\Admin\AppData\Local\Temp\7zO4659B0A9\ViLauncher-4.3.3.exe"3⤵PID:6496
-
C:\Users\Admin\AppData\Local\Temp\7zO4659B0A9\ViLauncher-4.3.1.exeViLauncher-4.3.1.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4520 -
\??\c:\program files (x86)\steam\steam.exe"c:/program files (x86)/steam/steam.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1492 -
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" -nocrashdialog "-lang=en_US" "-cachedir=C:\Users\Admin\AppData\Local\Steam\htmlcache" "-steampid=1492" "-buildid=1738026274" "-steamid=0" "-logdir=c:\program files (x86)\steam\logs" "-uimode=7" "-startcount=0" "-steamuniverse=Public" "-realm=Global" "-clientui=c:\program files (x86)\steam\clientui" "-steampath=c:\program files (x86)\steam\steam.exe" "-launcher=0" --valve-enable-site-isolation --enable-smooth-scrolling --enable-direct-write "--log-file=C:\Program Files (x86)\Steam\logs\cef_log.txt" --disable-quick-menu "--enable-features=PlatformHEVCDecoderSupport" "--disable-features=SpareRendererForSitePerProcess,DcheckIsFatal,ValveFFmpegAllowLowDelayHEVC"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:5580 -
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=crashpad-handler /prefetch:4 --max-uploads=5 --max-db-size=20 --max-db-age=5 --monitor-self-annotation=ptype=crashpad-handler "--database=c:\program files (x86)\steam\dumps" "--metrics-dir=C:\Users\Admin\AppData\Local\CEF\User Data" --url=https://crash.steampowered.com/submit --annotation=platform=win64 --annotation=product=cefwebhelper --annotation=version=1738026274 --initial-client-data=0x298,0x29c,0x2a0,0x294,0x2a8,0x7ffcc6a3af00,0x7ffcc6a3af0c,0x7ffcc6a3af187⤵
- Executes dropped EXE
PID:3040
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=gpu-process --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1738026274 --steamid=0 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1612,i,11379142328048613395,14850673451745212937,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=1616 --mojo-platform-channel-handle=1604 /prefetch:27⤵
- Executes dropped EXE
PID:6480
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1738026274 --steamid=0 --field-trial-handle=2272,i,11379142328048613395,14850673451745212937,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=2276 --mojo-platform-channel-handle=2264 /prefetch:37⤵
- Executes dropped EXE
PID:6880
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1738026274 --steamid=0 --field-trial-handle=3080,i,11379142328048613395,14850673451745212937,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=3084 --mojo-platform-channel-handle=3076 /prefetch:87⤵
- Executes dropped EXE
PID:3184
-
-
C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Program Files (x86)\Steam\bin\cef\cef.win7x64\steamwebhelper.exe" --type=renderer --user-agent-product="Valve Steam Client" --user-data-dir="C:\Users\Admin\AppData\Local\Steam\htmlcache" --buildid=1738026274 --steamid=0 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3404,i,11379142328048613395,14850673451745212937,262144 --enable-features=PlatformHEVCDecoderSupport --disable-features=BackForwardCache,DcheckIsFatal,DocumentPictureInPictureAPI,SpareRendererForSitePerProcess,ValveFFmpegAllowLowDelayHEVC --variations-seed-version --enable-logging=handle --log-file=3424 --mojo-platform-channel-handle=3384 /prefetch:17⤵
- Checks computer location settings
- Executes dropped EXE
PID:3200
-
-
-
\??\c:\program files (x86)\steam\bin\gldriverquery64.exe.\bin\gldriverquery64.exe6⤵
- Executes dropped EXE
PID:2608
-
-
\??\c:\program files (x86)\steam\bin\gldriverquery.exe.\bin\gldriverquery.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1828
-
-
\??\c:\program files (x86)\steam\bin\vulkandriverquery64.exe.\bin\vulkandriverquery64.exe6⤵
- Executes dropped EXE
PID:6152
-
-
\??\c:\program files (x86)\steam\bin\vulkandriverquery.exe.\bin\vulkandriverquery.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start steam://run/7305⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4064 -
C:\Program Files (x86)\Steam\steam.exe"C:\Program Files (x86)\Steam\steam.exe" -- "steam://run/730"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO4659B0A9\ViLauncher-4.3.2.exeViLauncher-4.3.2.exe4⤵
- Executes dropped EXE
PID:6364
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x4901⤵PID:6912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD533bcb1c8975a4063a134a72803e0ca16
SHA1ed7a4e6e66511bb8b3e32cbfb5557ebcb4082b65
SHA25612222b0908eb69581985f7e04aa6240e928fb08aa5a3ec36acae3440633c9eb1
SHA51213f3a7d6215bb4837ea0a1a9c5ba06a985e0c80979c25cfb526a390d71a15d1737c0290a899f4705c2749982c9f6c9007c1751fef1a97b12db529b2f33c97b49
-
Filesize
2.5MB
MD5ba0ea9249da4ab8f62432617489ae5a6
SHA1d8873c5dcb6e128c39cf0c423b502821343659a7
SHA256ce177dc8cf42513ff819c7b8597c7be290f9e98632a34ecd868dc76003421f0d
SHA51252958d55b03e1ddc69afc2f1a02f7813199e4b3bf114514c438ab4d10d5ca83b865ba6090550951c0a43b666c6728304009572212444a27a3f5184663f4b0b8b
-
Filesize
17KB
MD5771b19496d7eff657bb4b2b74d3cdfb2
SHA10757de9232b697689a2f8cbbee5ac231cf4851cc
SHA25668c74751ff5f690640d9ae54e0be46347fa4a23bb1bc8ee024100b1819520b6b
SHA51275ad484f6889989841e9c7356d52d85499166dbb0926f22d04883eae716e1b0f3bc22fe1d7b5b06df236a0e8b8916611d3d3617de04dcee2fba7918eceaa46cc
-
Filesize
1KB
MD5a2ec2e91c3ef8c42e22c4887d032b333
SHA1e2c738a2e9400535b74e2263c7e7d1ecefe575f2
SHA2568f9f970835f133258a7f740126012439385bbaa5a1d6a9d0d967a390977441c3
SHA512b069d241efb19e09ec8b5e60ef6c43e00d5cc0f774b9340127c2180356dd1964ac625c1afdfaee5f99e72b26f56046fc329aadbbc365b403af765a55e9c9aab3
-
Filesize
19KB
MD55dc363b785d9933802b5b629132ccb85
SHA1fbe1af56c202a212b6745c9483cee079009d313e
SHA256d69765d9813f72998389284323c610a790d70a3e78d7cf103501cbceb66a216e
SHA512318318c0fd5cba06a886a9395e568bf60778e4385952865d0b0e8c631d4ebfc641689ff53ef20c4d073b7dc8bcd1b24b122e63d53571dca0c8a3497c67b17650
-
Filesize
1KB
MD56e6a2b18264504cc084caa3ad0bfc6ae
SHA1b177d719bd3c1bc547d5c97937a584b8b7d57196
SHA256f3847b5e4a40d9cf76df35398bb555117dfe3626c00a91f2babdedb619d6ad53
SHA51274199ff275400b451642cde0a13b56709735676959d65da11ac76dd645ab11dac5de048ff7ede0cb8adb3a3056b3ecbeb3dc7481bac3768d02051e564c74b679
-
C:\Program Files (x86)\Steam\package\tmp\graphics\[email protected]_
Filesize15KB
MD5577b7286c7b05cecde9bea0a0d39740e
SHA1144d97afe83738177a2dbe43994f14ec11e44b53
SHA256983aa3928f15f5154266be7063a75e1fce87238bbe81a910219dea01d5376824
SHA5128cd55264a6e973bb6683c6f376672b74a263b48b087240df8296735fd7ae6274ee688fdb16d7febad14288a866ea47e78b114c357a9b03471b1e72df053ebcb0
-
Filesize
20KB
MD500bf35778a90f9dfa68ce0d1a032d9b5
SHA1de6a3d102de9a186e1585be14b49390dcb9605d6
SHA256cab3a68b64d8bf22c44080f12d7eab5b281102a8761f804224074ab1f6130fe2
SHA512342c9732ef4185dee691c9c8657a56f577f9c90fc43a4330bdc173536750cee1c40af4adac4f47ac5aca6b80ab347ebe2d31d38ea540245b38ab72ee8718a041
-
Filesize
23B
MD5836dd6b25a8902af48cd52738b675e4b
SHA1449347c06a872bedf311046bca8d316bfba3830b
SHA2566feb83ca306745d634903cf09274b7baf0ac38e43c6b3fab1a608be344c3ef64
SHA5126ab1e4a7fa9da6d33cee104344ba2ccb3e85cd2d013ba3e4c6790fd7fd482c85f5f76e9ae38c5190cdbbe246a48dae775501f7414bec4f6682a05685994e6b80
-
Filesize
4KB
MD50340d1a0bbdb8f3017d2326f4e351e0a
SHA190d078e9f732794db5b0ffeb781a1f2ed2966139
SHA2560fcd7ae491b467858f2a8745c5ecdd55451399778c2119517ee686d1f264b544
SHA5129d23e020875ed35825169a6542512ec2ffdb349472a12eb1e59ddc635e57c8fd65fa919873821e35c755aa7d027c9a62d3d0fa617340449d7b2c4cf8dd707e93
-
Filesize
6KB
MD54c81277a127e3d65fb5065f518ffe9c2
SHA1253264b9b56e5bac0714d5be6cade09ae74c2a3a
SHA25676a6bd74194efd819d33802decdfddaae893069d7000e44944dda05022cfa6d9
SHA512be077b61f3b6d56a1f4d24957deaf18d2dff699bda6569604aac4f1edb57c3cfd0abc5e2a67809f72e31a90b4aed0813536c153886da2099376964c60e56001a
-
Filesize
4KB
MD52158881817b9163bf0fd4724d549aed4
SHA1c500f2e8f47a11129114ee4f19524aee8fecc502
SHA256650a265dffdc5dc50200bb82d56f416a3a423eecc08c962cfd1ba2d40a1ff3f7
SHA512f3594aad9d6c50254f690c903f078a5b7a58c33bd418abdad711ebb74cfbdb5564679593e08fb2d4378faaf4160d45e3d276ba1aa8a174ed77a5791bcac46f28
-
Filesize
4KB
MD503b664bd98485425c21cdf83bc358703
SHA10a31dcfeb1957e0b00b87c2305400d004a9a5bdb
SHA256fdf7b42b3b027a12e1b79cb10ab9e6e34c668b04eb9e8a907d8611ba46473115
SHA5124a8cdd4b98432ba9d9b36bc64aab9a2eab31a074d1cbdfab3d35a14216c60752b5580c41bbb70104993420043685d3bd47eb6637b8fcbb3f42f76a15e4be041d
-
Filesize
4KB
MD531a29061e51e245f74bb26d103c666ad
SHA1271e26240db3ba0dcffc10866ccfcfa1c33cf1cc
SHA25656c8a86fa95eab0d8f34f498e079b5516b96d2a2f1ad9c2a888555e50e47f192
SHA512f85865c1e9ab45e5586d3dd2b45d15265193e8a3c34b6bb1ac7e415a1ea878cfb044e8e01012e917e4f00bb9e0a422f56253f328df1bac99a145e19433354cf8
-
Filesize
4KB
MD5da6cd2483ad8a21e8356e63d036df55b
SHA10e808a400facec559e6fbab960a7bdfaab4c6b04
SHA256ebececd3f691ac20e5b73e5c81861a01531203df3cf2baa9e1b6d004733a42a6
SHA51206145861eb4803c9813a88cd715769a4baa0bab0e87b28f59aa242d4369817789f4c85114e8d0ceb502e080ec3ec03400385924ec7537e7b04f724ba7f17b925
-
Filesize
4KB
MD59e62fc923c65bfc3f40aaf6ec4fd1010
SHA18f76faff18bd64696683c2a7a04d16aac1ef7e61
SHA2568ff0f3cbdf28102ff037b9cda90590e4b66e1e654b90f9aea2cd5364494d02b7
SHA512c8ff15373b37e848e6239a82424569e77c82a5fc557d17e7d2ed1d0d2b2f7d026cc1e2bc98cb5ee945c02cfefb82803c23fa6a26f48ff0adcf762f94cd5dd035
-
Filesize
4KB
MD510c429eb58b4274af6b6ef08f376d46c
SHA1af1e049ddb9f875c609b0f9a38651fc1867b50d3
SHA256a1f6ba57ee41e009d904905c0ce5e75a59ee6790e08542561303109e1faafa13
SHA512d8760f61760bffd8671b727d386ae220e7e6e68829a01553cfd5eb60ef8bd1d7c1b25e7b17a6db5bd17ba6712ef44999726764459318e784843c73bc4facaf46
-
Filesize
4KB
MD55c026fd6072a7c5cf31c75818cddedec
SHA1341aa1df1d034e6f0a7dff88d37c9f11a716cae6
SHA2560828572e4fa00c186dbf1d9072a6154d65cb499c6a37e338f3305f77a2fee382
SHA512f9d28714b2a05f8d9025f1692e4d7e8baa6daf6176353f65646a38814a242ef2adededa44419edd69f10cf96ffba506dab7cb6e52111457bf69cffef12174b12
-
Filesize
6KB
MD5189ba063d1481528cbd6e0c4afc3abaa
SHA140bdd169fcc59928c69eea74fd7e057096b33092
SHA256c0a7a1df442ac080668762df795c72aa322e9d415c41bd0a4c676a4dc0551695
SHA512ce59ad9b17bab4de1254e92ce4fe7d8c8242832f62ab382e8f54199a9932cd11b5800cc33895441426373d5210cc74104e0271b721a7e26ed400b716ae4d5903
-
Filesize
4KB
MD518aaaf5ffcdd21b1b34291e812d83063
SHA1aa9c7ae8d51e947582db493f0fd1d9941880429f
SHA2561f45bb7bdfa01424f9237eec60eba35dc7f0dc4e8c2e193fe768fe96d3ff76d5
SHA5124f3e56d1abe26b56d3f805dc85baaca450c0c7bec57ebcf8a6bb6ebb8588307dad130c83bf792bac76694909a14fd6a4d7d1e9b31e32fba11256343b9fc18154
-
Filesize
4KB
MD51514d082b672b372cdfb8dd85c3437f1
SHA1336a01192edb76ae6501d6974b3b6f0c05ea223a
SHA2563b3c5c615fd82070cc951ab482d3de8cb12df0b3df59fbd11f9d3271fa2fbca4
SHA5124d41c945ce7c94746875b0dbceb14811d4966de4e97fe047406a304162fde7e1e2a16367fc2e43978e2e5aa66749f036b4444aa2312673c2cc3af296e8b77f55
-
Filesize
4KB
MD58958371646901eac40807eeb2f346382
SHA155fb07b48a3e354f7556d7edb75144635a850903
SHA256b01ec64d75fd1fbd00fbeb45a3fb39244911a8b22bb43de4e0c03f205184f585
SHA51214c5dbb017822336f22bf6779ccd4a66604ddc5f2c3caa24271e96f739fef007754d96844efa422d6682cbcd2d3bc902c36f0f6acb3eb87ed8d7b3f885973554
-
Filesize
5KB
MD57e1d15fc9ba66a868c5c6cb1c2822f83
SHA1bfe9a25fdc8721d7b76cecb9527a9ba7823dc3d7
SHA256fc74e26a8baabbe4851109512d85173b75dbf7293d41eb3b92a1957a773c8265
SHA5120892be14a858cc860766afb1c996b2c355108a7e50971ea3ec00d15069e919a6eb05a61fa839bea3938492c391e274144c5e248f4c204a602bf36adf27e5b406
-
Filesize
4KB
MD5202b825d0ef72096b82db255c4e747fa
SHA13a3265e5bbaa1d1b774195a3858f29cea75c9e75
SHA2563d1399f5323a3ece1b1a8b3b31f8fd7f50c3bd319ab3f1c38c6e347452c95314
SHA512e8fc7cc09f431301d22a07b238179ee053505090e3c4db30ead061513fe7159f1fe8b80efc93f4597fe00f01087bbe0bb2231e13693d72c8def138657cb91566
-
Filesize
4KB
MD57913f3f33839e3af9e10455df69866c2
SHA115fa957d0a6a2717027f5b35f4dbe5e0ab8ece25
SHA25605bc1f4973c6d36002ac1b37ce46b1f941fcb4338282e0ec1ec83fb558d1a88c
SHA512534e541757d19ee157a268bf7ea358b48015f400542fcfa49cdb547cd652926160f015fe2cf026d9c4996e56ab90ca3899dfd457997d915bf6bc9d7bb00ba804
-
Filesize
4KB
MD558e0fcbee3cca4ef61b97928cfe89535
SHA11297e3af3ca9e4fe3cc5db78ebbfa642e8a2c57b
SHA256c084a68b65d507eb831831aa2ab9afb9536cb99a840d248cc155ff87fad18425
SHA51299aff0c481e34cd0e4fcbb2af471afb56d91aa11be664462b08e17ae169ca03ef77e7063b4ecd0f38ca7b2f6dc0bf2e316c7b31dffbbcfc763cd8fae27dc78d2
-
Filesize
4KB
MD59b0b0e82f753cc115d87c7199885ad1b
SHA15743a4ab58684c1f154f84895d87f000b4e98021
SHA2560bdeee9fa28d54d384e06ea646fbcfe3f06698a31dfdc1a50703ffe83ad78d32
SHA512b7780b82fbe705bc8e5a527c011eb685c99ef0b2eb810617b9f82b891341af95ef1c2f46dce9e458c0c4dcc3e7a0d21db6c77f03419cd1c4b521a9b72f9017df
-
Filesize
4KB
MD5eb8926608c5933f05a3f0090e551b15d
SHA1a1012904d440c0e74dad336eac8793ac110f78f8
SHA2562ed2b0d654d60e0a82b0968a91d568b775144e9d92f2b077b6da75f85ad12d04
SHA5129113c42c38836f71ff0cc7019aff8c873845f47fbf1ab97e981cb038f4d8495b6df784402b1ee9666e8e567ae866b0284c81e6a16efb47131d5ef88569c4843a
-
Filesize
4KB
MD56367f43ea3780c4ee166454f5936b1a8
SHA1027a2c24c8320458c49cd78053f586cb4d94ee6f
SHA256f8d1972e75a320344e3c834ba0a3a6a86edb39e20ef706bda9b7965d440d1998
SHA51231aab33e0d272cb43a8c160b3d37256716a683e5052192fd0e4d3cdaf30a10a9afa9d26d5d14ad216ee455627c32892a711d2bc137ee7a7df9a297f001a19e32
-
Filesize
6KB
MD5e04ad6c236b6c61fc53e2cb57ced87e8
SHA1e9d4846b7e6cc755ee14a5d3fa45ee7d3bf425a4
SHA25608c775efa77c2a92d369f794882e467b6e2526e61bc7aa7724f48e174524502e
SHA5120dfb7e6d811d649103499018f3d115c542fcaba420ceb69124a4d837fe162ce514e7be2040860c5ef5f9c01c961fa6eea8730606b73ec107d87597989b6fd331
-
Filesize
152B
MD57fb0955b2f0e94f2388484f98deb88f4
SHA1ab2363d95af3445a00981e78e6b6f0b860aade14
SHA256a7c4cb739d577bfc41583a2dbf6e94ae41741c4529fe2d0443cd1dabefef8d15
SHA512c9b6b6de78fb78c11b88860cd6c922d11717f5cf7477f602f197531aea114270c2b7111f66d96f60c3a9317fbf203fd26222e81d2d0eb70ad6515f5af1277edf
-
Filesize
215KB
MD50e9976cf5978c4cad671b37d68b935ef
SHA19f38e9786fbab41e6f34c2dcc041462eb11eccbc
SHA2565e8e21f87c0a104d48abc589812e6f4e48655cabe4356cda9e3c1ceee0acaa4e
SHA5122faa6fff6b47e20fd307a206827dc7ff4892fce8b55b59b53d3e45b7dcf5fd34cebc4776b63da5aa4d0e0408344bd4602d26d09e7a456dd286e93b768cbfaa51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD55dd6d97eb0fc86537d11799edb301d11
SHA190f3594886d637d4921d4d9f7fa975a4dd4a3cd1
SHA256c7486a844da4e310e329cfb9e919ca3721a95600c8cd929cf91e65865ddae32a
SHA512c0ded3bbc7379d400e542bb16ad2382a9540db888bc9bb0fdedcb4484d04fe09c7517d0ca65f48e707e09e7fa02f9bb83dd65df6681ebbe8931f939634dd6389
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5bb3499abc70dfa30c1a7d01fefe48506
SHA177bfd8c690815cbd14d448f34c7d8432cbf5a281
SHA2565467dcf3443ac7cfbb1c340e88d25e9e413f0d450be32831a8bea495c3bf4754
SHA51230f1b0eb7290338662544a9f8f3faa0d5a424a73e6461f4eb6f56fd1a7b62fc5e7980a8e613d20a4f880e6870a1833370fb2469724fea4ff8aeef7270bf2ea21
-
Filesize
6KB
MD51bf7656897184708182b673bb9a6f92b
SHA1106b2e6c9f314713b91ce6914d76a7b4bc5719be
SHA256731b0c97c5baf7a5149463da808db774f162fe500039bab49537682041652904
SHA51228ed8607b68aad5757c2a1a340d4118d3bf2bf75dfe310f258e37be0524c47d86b64b5aae5d18bc1ef8037390c3941881677c50f7c806b6394cf339a78693ef0
-
Filesize
7KB
MD5679f03438a35aa2b74ef00980a182966
SHA1220b9c40720cf45f8ddd800ecbd8e110b770c8c5
SHA2563b39628cb3e9cb2d05cc6012962ff0f65068458fa5553e8ff4fdeb0e3dc774c6
SHA5129cc9080227d3a82c8862c4d123a27caea01b6ee4095040b3db74e419aab5c2826a99a0fda69cd6d4618a20e8a3027be00e1311a22fa1b12625e10c38aa0c5689
-
Filesize
8KB
MD51616a850d8f4e188d6763ed07d1e83a8
SHA1fa350e482ffcaa9b70532e94e2acf51965a93b7d
SHA25645727ff26a4df22f9212260e4bb14df6f5866103b987ce4f75bf3553d4505fcc
SHA5126114aa10165dff36d0ab95e7f4234a9dba5bfcff0c59bd5e0d891161f29c1b6a03434e04b575583564b6d8a42f63cb03e0fa0a126c9ca9be4126f0578ca2ec25
-
Filesize
10KB
MD5e0da60f6de6e0a24feea914f66dfeec0
SHA148f0016fec372510fd8f882c405636837fc3bddf
SHA256e39fe3da2cd788c3a3c12eb61d8adcc955dd7869b81f328924d7580f78bb8213
SHA512aea1415c1a13f5bea0efe396cedd26dc977bb44e144d227fa81478f0ba0ba3331a5cc04bc2abb66a40eaa5879ec9f8db7183f19f4b299a75f1a8eeb244283a74
-
Filesize
9KB
MD5d6ddca376896dff849a6f39f2a9a3949
SHA1c73846a722b24c3e56cd7786057e38c1f385d04d
SHA2564599566d171540ca55c3be39687a51963a6acbe259b1ceedc179104e882e2e6f
SHA51280a726eeb650b5e054cb7eb322b8531010b7bc7e25cebeb501a317b0c76d66ba4a036c1d338bde757818ca49616aa01ffe0f1193268748fe2b9523918ec6d102
-
Filesize
10KB
MD5e988d02c117310d1296af38bdfd02ea2
SHA196c86e0e767feb95a98522f37e5f4cad812ecb09
SHA2561633983efcb3dc111c5af3460aef481bd1cddaa5a9b74e2331d16a18c6d3ca7a
SHA512e5e5ed70be6b5bb398db458af18c4e1165dc23032d4dca6d9cb8e12775b28ffca4ba8703249fe7b2fdbcf30cde15d8dbe92c08f2ad180e5f2bb42adeffe38cbe
-
Filesize
5KB
MD5a05a4a83a33974339f45a199aacd8878
SHA1e5f3da6f13e4ded88f953881a48297362ebe7074
SHA2565d941f7c5c153b6234613dea5a3ad1121529abdff28069cc1f77f729e70a34d7
SHA5125bc72e91eb65e19cac04ed5c68a5540de730895a5ce0bc7b05108078d6933b610380e644dbc23799b4243fb752ea96bd21553afdf26f6cc9d68ccf2bf2e82fff
-
Filesize
10KB
MD554c9543b56907c813e953eb941c96bd1
SHA13108e33686079226a89c0dafe97055842ce6f2ea
SHA256751c61c7d73574c251ef6a6631f6c96da1ca384b23d0a6b5d453df83b7aaddb1
SHA5125280c4093a0cf85e04ace18ea9729acf2f6e11b49b4da8b32cdbf8f9c1636481bf6ae54c0be68e75ade03299366e275a1dd954a295909e2a63159786e5e862d4
-
Filesize
24KB
MD52627e6345730a6a479da30c0883d24a5
SHA17442a41a25fcc5415e1609b647c6e414a32c7b99
SHA256640a5e5b62d5e5ce53f120e2238d95d61f09b45d0d4035fcedc0f452c431b26d
SHA5121cd1044e89ebd307c088b4ebe587d41dee3b6dfcb10fc4f70f95819fc9b1f98132b9715cf1bce76d5f15d97802e85776f2ae6bfb293c4d033e661e5d34354d28
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55c7b64cef2ad40ba84d558dd65e82fe0
SHA1dda8c990d323ed54c15fc22011cc68d861327d4d
SHA256d406ab366b9168b1eb302ae0dd37782d94ba6644399d5752b676a95f305b1c0c
SHA512638c3d51435d35ebb0d170cacd0fd839ecba0f1da5fab9b562b070f60cf84e1f2a84566fe5de1043b2692386ff9b3b9134a9ae63c6f94e42b296671b672be522
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581095.TMP
Filesize48B
MD5934cc9af5d84dd7bb1ab2505b6fec677
SHA116d9df341934aff018c25f3279b52af842e5ccf8
SHA256fbd6c38ab331b2fff113dacd7c2c2d72af0bed8e008c3d3c741844f203559690
SHA512904909e437cd554fbe33e40c017e793bf9c6999d21a9ba6b13f4bff8603ca866428ec4cec6f94cda206414c9e02a79f5a9d14a8f3f9ac3687a458933b7b015b6
-
Filesize
2KB
MD503fa20e81fb3458cdfc4a664c22632f6
SHA133f75dc7f6e45e192695f64aa9dfaef923a95115
SHA25625c885bf53a7b90a082cb38010a0b6ff1bc8ed751d52f495eb8bf450e4d57837
SHA5129db15400ce8ea3d588ee276cae120c9d29a658b5b7dde9cac5ab25645959615122514d9dcab243e6c17a674bb061206d690f88fb2593aaf253a89f30b784c69b
-
Filesize
1KB
MD5298b3e644a160fc9fa393d0886963a4d
SHA13ed9be82516ec3ab96f3878ae3ad1524a27399f7
SHA2563feeb240534532de665dd0683b85c03dfd0adf6876fc2350c4da584841664c26
SHA512043601d1be0d5ba486b33c89f10af89559bc1c9190dc44ee882c926875e3fff1baf234421c751d1f706b1dff70945d9b3214de487ccec3834abaa3983d41d17d
-
Filesize
2KB
MD59bd8e6b3ee7ec32c4efe4ee8f75753bd
SHA1f79da0141cecc3d813a9f63390eb9aff007529b0
SHA25618781ff967f440e2a1be2aa58bb79a717764f06b98815172869b25391290e380
SHA51286f4bc0c94f79bc90641adf6ce19c53b30368ec4cdd8d56c59c0977f612a028e86a61002b8f218fef59d24788bef5627be79ecf6d700105aba61e4ca4337541c
-
Filesize
702B
MD507de13c6ff3d8fa794b493ba4ecdf84c
SHA179ecff0c6def2356ee8b41d05e0076ae47178286
SHA25674717553ef4e2582ca842a3e9d9a553edf67a6c5bf42aee7a00e5a58449f50af
SHA512b8ebb564e5ca99f0871715c2aab28b156e6328a11883ef1cd931e65d3631213b35788ccf4c53da3d216917e35b99c21e3dbbc050d276ea4a8c53cb66800df739
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD534d5ec723ebff75d92f8962bfecb7e16
SHA1f730c72963b3969f3f5ec9ab95604f06d997986d
SHA256bdd911a4d49d563e181c50f48857df552a07ffbffaedef014b769300ba30307a
SHA5128d44fff98539cbf1fc5caef06f04e8054a0b44944c8f492664cbce04db3a2640c836ba3c80d437b9f2cf7924e83b9c6ed5f6b67c01bffcdcd49b229c9fa1595e
-
Filesize
11KB
MD5e203f154bf5a1c56c566e794459cccc3
SHA148d523e63f67ad5a3996e1c547a627cddbb894dc
SHA25616cdfa7ba72423427dfa8b0417f6ff1273c0bd3a7359dc500d49842be8af4d91
SHA51203f3d8a745df84651336712f3f4cfefaae4e2aaf849c6f08224ffc7c851f72e2efb7a712b9fed9e2c085091d8f1899bda88ae50ed12ca529ea0c3d74f55e663e
-
Filesize
11KB
MD5e35686cbdb2262d10162b6e9e871f329
SHA1a87fa5288cefbdcbdd13c776889a7e4ca94aa411
SHA256258f8c63b2ed1530371f991bc3a1c83fd26c32372b9f961d838a4a9e7be5648f
SHA51298ce59fc8224110dd137085aaa13334523ff18e786ee9f9c2c3210e9664026d53bb201a07b1704a035dfb65726f57d54d2e9fe6d8698893da682d207ae2176c5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
240B
MD5c8e9b8f4639ec4959eb7f467d13b9a58
SHA161c9bdf649b75285c142f289054b94c8e8b19d79
SHA256f917ef7e70318abf3320413062a6e1419bfd58e25be6843680ce2dac1a850a1b
SHA5128a4e34a2480172dfa703877da70f73480cc6ed8f279c2a5898223ba704d74497a6b271f12a265fb4f7e87e049c632b3ac0abef922b5595c91dc476380b7861a6
-
Filesize
240B
MD5c3a7fc5735f7e6b496dac3fc3878db2a
SHA14ee5c8b1e9c1494bf84b0442f1bc5af1388bbd6f
SHA25626cdc4076cfb2548eafdccfbed9049c8e59304b4b9ca42d17a456425410dffc7
SHA5121e59f5107b3e2c66b51a193f3d664ae58a25ea338c6550150365d850568cccc3902ba7bd6b1bad656aaf23fc3cd411207a16fc5f943ed5605eaadcfab92087d7
-
Filesize
48B
MD5a93291b592159553333356079cb89e0d
SHA1561850e2e601b7c5b07a3d1799ecb1eb1e6805e6
SHA25680d2ff684438f944b782c1215cd5a686b9b1a41894a9bef2cb384d629f24b4b4
SHA512d61b80b7700476bbda8937b463bfa857007a95a411249506d79bad8444205633332e3fa1b9fd4081407ae90d9c788c8bf5cc054fe56030bac8e6f75c6255ff6e
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
391B
MD53fd3c562836f928287d7ad61509f9c56
SHA198cd74754ec9a353c777c5645da2c16a6ba6f966
SHA256d170f52023c92d17ed9b074421f8e6d22a9a3038616eb70933c6c0c822c980be
SHA51280e579737e627eb05952d74fc760533c6f6a4b9c2979738c27b4372b9385606c89c12a8da878a1b417a12171ddb586ed8bef2dee82b4e4ad124d7d3ceb12f1c3
-
Filesize
188B
MD5dc2e0f00f27fbdef3f452f51c710c5f8
SHA14c27d20ccea3e7e9e4863381c37cd75a0f1cfbc8
SHA25676545e65fb772cb5212742e24979b268b3711bb43ac070d7791170150cc872e5
SHA5126afa7d8ec3810eddb58d4fefdf6ed8fb367e0ab09bf976acd8a1199369542d57c27a5abc7478145046f562ce3c9dd4a3ec2f7bbd6dce098c20e8134d63b59664
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
219KB
MD56e88b280209419b70b93d7da1ec863fc
SHA1c078a67c9c08260d6a24d2647dc312f4774c637e
SHA2566fc2b7b3a8fb2f8e647eff8b40b70fe7c00db7d19b550255eafd7b2b0337224a
SHA5128b1a3b57d9337629f57f985a7b9c026045dd2af0c7654b4472fd24546eca249c295a700920183d2fc8df46e8a74aa9c65e5a17d989211ebfb9ef255bf42752a1
-
Filesize
110KB
MD5db11ab4828b429a987e7682e495c1810
SHA129c2c2069c4975c90789dc6d3677b4b650196561
SHA256c602c44a4d4088dbf5a659f36ba1c3a9d81f8367577de0cb940c0b8afee5c376
SHA512460d1ccfc0d7180eae4e6f1a326d175fec78a7d6014447a9a79b6df501fa05cd4bd90f8f7a85b7b6a4610e2fa7059e30ae6e17bc828d370e5750de9b40b9ae88
-
Filesize
22KB
MD5a36fbe922ffac9cd85a845d7a813f391
SHA1f656a613a723cc1b449034d73551b4fcdf0dcf1a
SHA256fa367ae36bfbe7c989c24c7abbb13482fc20bc35e7812dc377aa1c281ee14cc0
SHA5121d1b95a285536ddc2a89a9b3be4bb5151b1d4c018ea8e521de838498f62e8f29bb7b3b0250df73e327e8e65e2c80b4a2d9a781276bf2a51d10e7099bacb2e50b
-
Filesize
150KB
MD53614a4be6b610f1daf6c801574f161fe
SHA16edee98c0084a94caa1fe0124b4c19f42b4e7de6
SHA25616e0edc9f47e6e95a9bcad15adbdc46be774fbcd045dd526fc16fc38fdc8d49b
SHA51206e0eff28dfd9a428b31147b242f989ce3e92474a3f391ba62ac8d0d05f1a48f4cf82fd27171658acbd667eaffb94cb4e1baf17040dc3b6e8b27f39b843ca281
-
Filesize
20KB
MD54e5bc4458afa770636f2806ee0a1e999
SHA176dcc64af867526f776ab9225e7f4fe076487765
SHA25691a484dc79be64dd11bf5acb62c893e57505fcd8809483aa92b04f10d81f9de0
SHA512b6f529073a943bddbcb30a57d62216c78fcc9a09424b51ac0824ebfb9cac6cae4211bda26522d6923bd228f244ed8c41656c38284c71867f65d425727dd70162
-
Filesize
17KB
MD52095af18c696968208315d4328a2b7fe
SHA1b1b0e70c03724b2941e92c5098cc1fc0f2b51568
SHA2563e2399ae5ce16dd69f7e2c71d928cf54a1024afced8155f1fd663a3e123d9226
SHA51260105dfb1cd60b4048bd7b367969f36ed6bd29f92488ba8cfa862e31942fd529cbc58e8b0c738d91d8bef07c5902ce334e36c66eae1bfe104b44a159b5615ae5
-
Filesize
15KB
MD508072dc900ca0626e8c079b2c5bcfcf3
SHA135f2bfa0b1b2a65b9475fb91af31f7b02aee4e37
SHA256bb6ce83ddaad4f530a66a1048fac868dfc3b86f5e7b8e240d84d1633e385aee8
SHA5128981da7f225eb78c414e9fb3c63af0c4daae4a78b4f3033df11cce43c3a22fdbf3853425fe3024f68c73d57ffb128cba4d0db63eda1402212d1c7e0ac022353c
-
Filesize
31.0MB
MD5671468c6e6e6acd2241b9b216a3fbb20
SHA1ab4e03dfaa3190d4e5f27c8f34c299ad94082a43
SHA256d5f328f96b77d71e49dc6317bb5c83b46fe54cff7ca1cb2681edc88c16991da7
SHA512e1d25ef8c2d08dd66647df375511f46dfc20d6ec7d329f36bc3478dd98a45e974f6afadf14ae45e67a40f6ecc559f1cd0a2d576399fad321210e0e727442e5ad
-
Filesize
2.3MB
MD51b54b70beef8eb240db31718e8f7eb5d
SHA1da5995070737ec655824c92622333c489eb6bce4
SHA2567d3654531c32d941b8cae81c4137fc542172bfa9635f169cb392f245a0a12bcb
SHA512fda935694d0652dab3f1017faaf95781a300b420739e0f9d46b53ce07d592a4cfa536524989e2fc9f83602d315259817638a89c4e27da709aada5d1360b717eb