Analysis
-
max time kernel
156s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 05:12
Static task
static1
Behavioral task
behavioral1
Sample
WEXTRACT.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
WEXTRACT.exe
Resource
win10v2004-20231215-en
General
-
Target
WEXTRACT.exe
-
Size
1.5MB
-
MD5
12382062c6abc23ebdf6aec25f383fa4
-
SHA1
9834dc9a4fd1f037c574c27a932c96d68409c882
-
SHA256
24b66c0d6f26f5de09b4cb7a2496bf87ad0ed9d45e846870dee70941b565bc3c
-
SHA512
6cd21a5803f7a90d3ea2b1c6a05def58e337773378c0aced7ac9d3538fa1f9a539b4c992bbe7655aa052abd88cde1bc8475a3a780187ac25edba89ba5806f55c
-
SSDEEP
49152:/I4a/fuUWyY2dhl3pmcmVFSD2TDi+SyEU/6QB4:wx/GUxmVoJvyR/6R
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
-
url_paths
/theme/index.php
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral2/memory/3692-46-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/memory/3692-47-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/memory/3692-48-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/memory/3692-50-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/files/0x000600000002312e-81.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1976-63-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 5NS8xD0.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 15 IoCs
pid Process 4712 Rw4YT03.exe 2000 nf4rn60.exe 1948 FJ4OU94.exe 4824 kK0yG24.exe 3824 qP5Qb44.exe 740 1rs14bk1.exe 5084 2Ro9432.exe 5092 3Hm09Ej.exe 2292 4ew995pG.exe 3748 5NS8xD0.exe 1008 explothe.exe 2808 6dg6UC8.exe 5004 7ct2pQ14.exe 5008 explothe.exe 116 explothe.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" WEXTRACT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Rw4YT03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nf4rn60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" FJ4OU94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" kK0yG24.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" qP5Qb44.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 740 set thread context of 1860 740 1rs14bk1.exe 99 PID 5084 set thread context of 3692 5084 2Ro9432.exe 103 PID 2292 set thread context of 1976 2292 4ew995pG.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3088 3692 WerFault.exe 103 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Hm09Ej.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Hm09Ej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Hm09Ej.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1676 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5092 3Hm09Ej.exe 5092 3Hm09Ej.exe 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5092 3Hm09Ej.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of AdjustPrivilegeToken 57 IoCs
description pid Process Token: SeDebugPrivilege 1860 AppLaunch.exe Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4712 4064 WEXTRACT.exe 93 PID 4064 wrote to memory of 4712 4064 WEXTRACT.exe 93 PID 4064 wrote to memory of 4712 4064 WEXTRACT.exe 93 PID 4712 wrote to memory of 2000 4712 Rw4YT03.exe 94 PID 4712 wrote to memory of 2000 4712 Rw4YT03.exe 94 PID 4712 wrote to memory of 2000 4712 Rw4YT03.exe 94 PID 2000 wrote to memory of 1948 2000 nf4rn60.exe 95 PID 2000 wrote to memory of 1948 2000 nf4rn60.exe 95 PID 2000 wrote to memory of 1948 2000 nf4rn60.exe 95 PID 1948 wrote to memory of 4824 1948 FJ4OU94.exe 96 PID 1948 wrote to memory of 4824 1948 FJ4OU94.exe 96 PID 1948 wrote to memory of 4824 1948 FJ4OU94.exe 96 PID 4824 wrote to memory of 3824 4824 kK0yG24.exe 97 PID 4824 wrote to memory of 3824 4824 kK0yG24.exe 97 PID 4824 wrote to memory of 3824 4824 kK0yG24.exe 97 PID 3824 wrote to memory of 740 3824 qP5Qb44.exe 98 PID 3824 wrote to memory of 740 3824 qP5Qb44.exe 98 PID 3824 wrote to memory of 740 3824 qP5Qb44.exe 98 PID 740 wrote to memory of 1860 740 1rs14bk1.exe 99 PID 740 wrote to memory of 1860 740 1rs14bk1.exe 99 PID 740 wrote to memory of 1860 740 1rs14bk1.exe 99 PID 740 wrote to memory of 1860 740 1rs14bk1.exe 99 PID 740 wrote to memory of 1860 740 1rs14bk1.exe 99 PID 740 wrote to memory of 1860 740 1rs14bk1.exe 99 PID 740 wrote to memory of 1860 740 1rs14bk1.exe 99 PID 740 wrote to memory of 1860 740 1rs14bk1.exe 99 PID 3824 wrote to memory of 5084 3824 qP5Qb44.exe 100 PID 3824 wrote to memory of 5084 3824 qP5Qb44.exe 100 PID 3824 wrote to memory of 5084 3824 qP5Qb44.exe 100 PID 5084 wrote to memory of 1912 5084 2Ro9432.exe 101 PID 5084 wrote to memory of 1912 5084 2Ro9432.exe 101 PID 5084 wrote to memory of 1912 5084 2Ro9432.exe 101 PID 5084 wrote to memory of 1400 5084 2Ro9432.exe 102 PID 5084 wrote to memory of 1400 5084 2Ro9432.exe 102 PID 5084 wrote to memory of 1400 5084 2Ro9432.exe 102 PID 5084 wrote to memory of 3692 5084 2Ro9432.exe 103 PID 5084 wrote to memory of 3692 5084 2Ro9432.exe 103 PID 5084 wrote to memory of 3692 5084 2Ro9432.exe 103 PID 5084 wrote to memory of 3692 5084 2Ro9432.exe 103 PID 5084 wrote to memory of 3692 5084 2Ro9432.exe 103 PID 5084 wrote to memory of 3692 5084 2Ro9432.exe 103 PID 5084 wrote to memory of 3692 5084 2Ro9432.exe 103 PID 5084 wrote to memory of 3692 5084 2Ro9432.exe 103 PID 5084 wrote to memory of 3692 5084 2Ro9432.exe 103 PID 5084 wrote to memory of 3692 5084 2Ro9432.exe 103 PID 4824 wrote to memory of 5092 4824 kK0yG24.exe 106 PID 4824 wrote to memory of 5092 4824 kK0yG24.exe 106 PID 4824 wrote to memory of 5092 4824 kK0yG24.exe 106 PID 1948 wrote to memory of 2292 1948 FJ4OU94.exe 109 PID 1948 wrote to memory of 2292 1948 FJ4OU94.exe 109 PID 1948 wrote to memory of 2292 1948 FJ4OU94.exe 109 PID 2292 wrote to memory of 1976 2292 4ew995pG.exe 110 PID 2292 wrote to memory of 1976 2292 4ew995pG.exe 110 PID 2292 wrote to memory of 1976 2292 4ew995pG.exe 110 PID 2292 wrote to memory of 1976 2292 4ew995pG.exe 110 PID 2292 wrote to memory of 1976 2292 4ew995pG.exe 110 PID 2292 wrote to memory of 1976 2292 4ew995pG.exe 110 PID 2292 wrote to memory of 1976 2292 4ew995pG.exe 110 PID 2292 wrote to memory of 1976 2292 4ew995pG.exe 110 PID 2000 wrote to memory of 3748 2000 nf4rn60.exe 111 PID 2000 wrote to memory of 3748 2000 nf4rn60.exe 111 PID 2000 wrote to memory of 3748 2000 nf4rn60.exe 111 PID 3748 wrote to memory of 1008 3748 5NS8xD0.exe 114 PID 3748 wrote to memory of 1008 3748 5NS8xD0.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\WEXTRACT.exe"C:\Users\Admin\AppData\Local\Temp\WEXTRACT.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rw4YT03.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rw4YT03.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nf4rn60.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nf4rn60.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\FJ4OU94.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\FJ4OU94.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kK0yG24.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kK0yG24.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\qP5Qb44.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\qP5Qb44.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1rs14bk1.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1rs14bk1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Ro9432.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Ro9432.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1400
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 5409⤵
- Program crash
PID:3088
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Hm09Ej.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Hm09Ej.exe6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4ew995pG.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4ew995pG.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5NS8xD0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5NS8xD0.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:1676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4288
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:1504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:4820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3736
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1892
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6dg6UC8.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6dg6UC8.exe3⤵
- Executes dropped EXE
PID:2808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7ct2pQ14.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7ct2pQ14.exe2⤵
- Executes dropped EXE
PID:5004 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\93BF.tmp\93D0.tmp\93D1.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7ct2pQ14.exe"3⤵PID:4192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x40,0x174,0x7ff9989d46f8,0x7ff9989d4708,0x7ff9989d47185⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,11148920301530504153,3334330073952730104,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:35⤵PID:6184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,11148920301530504153,3334330073952730104,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:25⤵PID:5956
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵PID:3816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9989d46f8,0x7ff9989d4708,0x7ff9989d47185⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,7225498500530734920,12162286081968313909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:35⤵PID:6204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7225498500530734920,12162286081968313909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:25⤵PID:4420
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:1372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9989d46f8,0x7ff9989d4708,0x7ff9989d47185⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,11483761159063414837,16122704703152393057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:35⤵PID:6432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,11483761159063414837,16122704703152393057,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:25⤵PID:6424
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://store.steampowered.com/login/4⤵PID:5036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9989d46f8,0x7ff9989d4708,0x7ff9989d47185⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5217424271309868026,1691308833266916522,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:25⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,5217424271309868026,1691308833266916522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:35⤵PID:5424
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://twitter.com/i/flow/login4⤵PID:468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9989d46f8,0x7ff9989d4708,0x7ff9989d47185⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,10178851587278994389,6960663519283791625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:35⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,10178851587278994389,6960663519283791625,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:25⤵PID:5444
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunity.com/openid/loginform/4⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9989d46f8,0x7ff9989d4708,0x7ff9989d47185⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:25⤵PID:6196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:85⤵PID:6356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:35⤵PID:6348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:15⤵PID:7040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:15⤵PID:7032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:15⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:15⤵PID:7076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:15⤵PID:7608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:15⤵PID:7652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:15⤵PID:7844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:15⤵PID:7856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:15⤵PID:7936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:15⤵PID:8112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:15⤵PID:8144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:15⤵PID:7196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:15⤵PID:7120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8968 /prefetch:15⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9012 /prefetch:15⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9500 /prefetch:15⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9420 /prefetch:85⤵PID:7204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9420 /prefetch:85⤵PID:6708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9396 /prefetch:15⤵PID:6372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8448 /prefetch:15⤵PID:6716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9144 /prefetch:15⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7172 /prefetch:85⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17836587075345399656,16317503754223736292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:15⤵PID:5784
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.epicgames.com/id/login4⤵PID:2672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9989d46f8,0x7ff9989d4708,0x7ff9989d47185⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,13823711228644054669,7075832564991416029,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:35⤵PID:6340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,13823711228644054669,7075832564991416029,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:25⤵PID:6332
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/signin4⤵PID:4212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9989d46f8,0x7ff9989d4708,0x7ff9989d47185⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,7374294628750089628,3693049977026162777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:35⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,7374294628750089628,3693049977026162777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:25⤵PID:5416
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/4⤵PID:512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9989d46f8,0x7ff9989d4708,0x7ff9989d47185⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,11122104101874640329,14719540964444816638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:35⤵PID:6260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11122104101874640329,14719540964444816638,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:25⤵PID:6252
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff9989d46f8,0x7ff9989d4708,0x7ff9989d47185⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,4206168176513549338,9529609043445168599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:35⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,4206168176513549338,9529609043445168599,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:25⤵PID:1616
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3692 -ip 36921⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6892
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57fa3b35ff84f9740410e3faa2ce16df6
SHA1602eb3fde2fe9040806197a3e02f78e2e146477d
SHA2569ee96d08f1a43a76ae6124a1f35aa3600a9b72877ed901b85883f09405ee9f15
SHA51230d3bc8d691141a94470dca7d6c3f455c04b1551aeb495ffe76e22843616c8480f603c08f4d5e3921d8990f3fa46067d2d551794813700a05ee7603d780578f9
-
Filesize
2KB
MD50585440130c23b635e072f96ea7c14b0
SHA18866597e5a0193977e5ea0707f4e3302d8e377ea
SHA2561635326bfcbc43fbeb1b71ff2dbeb073c743558462c34e384621e0dbb6f187cc
SHA512694755a718d8496fbb85a2aa5bc6d81efd3367947ceddca44b49ea3a0e0c358e32a7e6a01554c96bc6be3f014624d27b3d14e7fc5c7fab72acab3971ff6f963b
-
Filesize
2KB
MD5b33709d32e4c5e951e8dc11f70812928
SHA135b7b2b716c32eb3f457a14085bda95e570c645d
SHA256c8d92e53c91503697f765cec418b8cb379ba0d08e95598c222514c4a39176d91
SHA5123e6e4d71b83db274a5688e2f6e02211634624217bc0c14340aa87aadb125ad6d4fdff8316e3db4056105f1caa0299c8402e19d3b11906f97bc637aad898844fb
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
Filesize
152B
MD5b810b01c5f47e2b44bbdd46d6b9571de
SHA18e3d866cf56193ca92a9b74d1c0e4520b5a74fdc
SHA256d1100cf9e4db12cc60cce6e0e2e3d9697e762c219f6068eb55a1390777bf4b45
SHA5126bbf900b2f7614dd17aa6d5febe3ad1100851e2309ba2cd5219c5aa5af7bf830eec2cc88071d37987aa7e3f527b8df5b2d85e8b21b18fcb071baaab1a2eadae2
-
Filesize
21KB
MD57d75a9eb3b38b5dd04b8a7ce4f1b87cc
SHA168f598c84936c9720c5ffd6685294f5c94000dff
SHA2566c24799e77b963b00401713a1dbd9cba3a00249b9363e2c194d01b13b8cdb3d7
SHA512cf0488c34a1af36b1bb854dea2decfc8394f47831b1670cab3eed8291b61188484cc8ab0a726a524ecdd20b71d291bcccbc2ce999fd91662aca63d2d22ed0d9f
-
Filesize
33KB
MD58bbd91621e4ef3435b185ae880036002
SHA15c715702697e659dc77737efd3638716835bb5f1
SHA256222ae1f1e1989e4165e479649fd883b6c1f3586d6ad0e0183fcd72dabf4ba75a
SHA51206cc7ab00f3c659a4b6379b501e38f86a22d78c101b7de7e84e1f7dce7c42ad1e5825dae18c9e004230d2c4ed3fbca0984dbac0aee5ed1255fc1ae5571f45794
-
Filesize
190KB
MD5ffa8124745af888c412bdab5e41ca3d4
SHA13c523d56b6cb1b61746e30e079b8fc9de7d109b1
SHA256cec3a4ff9fb3d777e23b46f43b8c87152ebad4875bb5cd4c86eaa0ce73a89766
SHA51240374fbaaa43a2d5fc1e5e8a91d5b0ada09b82a2e463ecf6303dc011c2e0b82be9c44a5728027d89c93af66a1e090e4c2652059c0de2205478468760bcf6e9bd
-
Filesize
201KB
MD5e3038f6bc551682771347013cf7e4e4f
SHA1f4593aba87d0a96d6f91f0e59464d7d4c74ed77e
SHA2566a55e169bc14e97dfcd7352b9bc4b834da37dd1e561282d8f2cc1dbf9964d29a
SHA5124bee876cea29ad19e6c41d57b3b7228f05f33f422e007dc1a8288fd1a207deb882c2789422e255a76c5bf21544f475689e7192b9a8a80dc2e87c94ee0bc6d75f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD586c57254c271f8543afe0ce835d79536
SHA1be889a4ef52ad20e7cbb8143184f6ef7fcca232d
SHA2566320e7b502461fe4e37be9035ec62b6bceeda3b4faaef18fa05d5f3455360cbd
SHA5121c85c0af47183f76f5ee3848e4b833f459ba22482018cad51fd7b231993b684b16dc819b5b4261713b31235932b8b19680075e1f274256696495bee8736153bf
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5138d086cb5c3414baea987948f7a3d80
SHA116fc131579035e45a420131cf5c0f7a68d19c02b
SHA2562e74084611ccd509b6dbbbb4a3bee11b96b1fb9ce69d218329a63a8cd3c99b6d
SHA512586dca3e827644ca4e6e4a055619ab3db810f1f1c8ff11640f51c33a18d54d249fdae4be3bdba830fd846ad80ea59abbce6e31f50b62530620844401eb61b95c
-
Filesize
5KB
MD535b4fe059239ef443355698b4d94a428
SHA1fdde2a008c63d475dad6de6b780d3ae687a1ea03
SHA2565514f28bbcf2320a12eea09da875454c0247bddc0883c8bcfa32f3db86a681ef
SHA5126d2fbf0cf0b68df6ac3c2cb1888e87619e05b600b0c66eec1ba17e1457a883e5dcfb6959f098d26145094cfd56cb860cfbdd23c28e54ab045e71e5c708624e99
-
Filesize
8KB
MD5020ac4bbdb61c97089fdc00e1594c4dc
SHA1cdaa24c5ac1bd18d211de72dc7d05f7ae0bb0fcb
SHA25603ced7965e646ed09f24befc59dc4660938692fe04d6dc891eb853ea03933114
SHA51263a175425de6d0152d5531ff78312ec734e411ac54eeb4ad98286abd47f6e31513ab9abe9aa1f7ba6b650b9257646f54dfb4adc091bd35035fd3e7281fc8a9ac
-
Filesize
8KB
MD50b6c14d1d5ad13263e3ab1bb5d4d2377
SHA1d6484d0f2e30816143e769923a8f28f6f537b160
SHA256feb9f1b88a5a5c00d9e94840cdd20b34d0e1b621c2ec9e410f0b4485baa42911
SHA512c2aaed857c24d9757a29a3564a409bcccec7a87651a644fd27ad201d60e8646f7bcae876d58b9bbf9040692ca436a666340ae526a4fc04d81b1fd3d630892ada
-
Filesize
8KB
MD5b8469ac879a6620f4413542618bf476c
SHA15c81ea3831a491ea1bec56f4325dab68b81c4305
SHA2566cbc645c53f9dbb84a0c9ae09ee9f971e589e55c36ea6e0bf12f5a9c640a7498
SHA51266a4dd9da08fc91a27eba2b635e8f2c6f2145e7b657c7c445fea875d84c7868279abd771980950540d3f843e43df7ea63b26bb500796881bc900ceea0adb1816
-
Filesize
8KB
MD54a6c9e57e11bcc5ae2cb0a91a2498e6e
SHA161ac080ecd20a1bbbbfcc60712cef3dcdebf51ee
SHA256b0bb91450027087e972ac2f00a01e398d0eb46b1ae1950a9a8ee5a501cf60747
SHA5123813d590aa2c5736540a78dd1592d30f6d0722cc8bfbbab07a7ccdee8e52c3611e4bf49ae2febd455df1048843a595ad9ab078265eefaa9cf602efc5cf8cbb51
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD50886829c14500b48fe25c9f0ac89cd8b
SHA11b4cfb107280d4b55741114fc6033f6c6da1c374
SHA25612df237d82b0048c353417bbf0066069889ccc2aac50d02c238c18f2cc5e121e
SHA512a4648b40b7ece86b14860bb71abc78f2913268dba607256333e8e2ad1d44bc7516d9d84669f4cc5cb8879fc2d6cf505ab4d92e32d0ea22589d5489bb14447d81
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD508f17a9f4df48504f38ea4262c8d898f
SHA13cb4edc1ad625fff01df11a423d79a228daffbcf
SHA2560f76f38eedc2179f410c7d697bebb2eae7af5479f36014b4bff7565588459046
SHA5122c7aec3f4986b808e8b663da41ba1b34651a707ca26618f724710d16c70721112c794612ef30f765fe62f4861dff53caedd6e2f4c63b9ba9533db6766bfb6430
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5b8590f43b1a298bd5ff8e9bfe5fe468e
SHA18c2d81afa784d8dc3896683e5e7fbd193fe7e56b
SHA2564c0c9ea901110594420b7243058337295ce709e796ea338e495934ff37520ceb
SHA512b9b5a8a84d12da657e874f17361792a60419f30d8ca7aada794169acc79b7241e519afa17fd3803d10b6e388a6fdc87c2309b2b6c4d902e0f96428ff88d3550e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\8f7abdeb3486c1b8780fede76afc20e044eff1b5\index.txt
Filesize83B
MD555befe20b615f2cf6410f864cd2148cd
SHA1ea181eb8730b4d1c4114c910ed2bf50908550d59
SHA256499db1f75e1f5b22f3e6b742aa6ce26fef38c456ff300d2dbd5edd90f041d58e
SHA5124038b1a940ea34d5e55770b09c70edc3d70082f065b3cd1c330c8dab2090bf0f861c2eddd0d2f2463da9761323b3e82a36a07e53ab2072fc267c206361c62c2b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize120B
MD5bee41a2f3c3ceabc852ce6bfdfdb0c2c
SHA1c002731ee6a2e47aff61e95f0ebaa29efc32de80
SHA256ceeeafa340b347bf62e2ed853f79ffe1685e25ecfc9dfc97f8a1a4ef4229fed8
SHA512de1335340707916e7553d1ca704998d4d7ec93efcc4ab35c3351af917a3ccde97beba89cb51dd9d85c8d6e4209a74f050165b4cf21c4911ca05b77ddd389756a
-
Filesize
3KB
MD5afda7a995748e90d00377f9d9a29e961
SHA1087b203a56e783247f4b0edd34dcecf9c552218f
SHA2565fc6069ea8b58436929bc996f01cb625b3493357af87379c2f0519f5e6640847
SHA5128fdb22b36c4b42ddf73ea0a41148374b327ed669ffcdd2607ec4a87b81537122f20a56e92f92c1da56761eb181f7c9779bd59d15d15b4ed7b724d1c875751e91
-
Filesize
2KB
MD5e306a8530736c092b8f43dc613c1a33c
SHA1c0d784d7d4291b51b9b7d728e5d30f3eb9c69936
SHA25647458ebd86a6206961b105b5baa7431fe244906e0074688be7661fdcf58ff2d2
SHA5129ec8b7c2f2f107ba63d97a41d2375755d8fe57a4ad27cfaf9119ee61871231e5cf9447fddbdd746a23031487f9dff480b68319fd10b8f5e40d6e254a67232420
-
Filesize
3KB
MD525f62ff3ea871352628d22f859f88594
SHA141bf3481b2391df41b661795b7359075d4481d53
SHA25600b802d562baaaf29ef6da02cf6b8d8dd21c8e815a9373cffbadc224432e7806
SHA5125568c63c8562c3146ce35625b9422accbfb3f493995646470c063022a0f527dd03eb3d7c648fef179aa2acb67def4ee386989d40422e59548c08ac7e9186feb9
-
Filesize
4KB
MD5e7c3eee143d0d851fad4eb30c3c06ec5
SHA14dafc50fb4e11f3e54d6e77c3e6ce45a6de40990
SHA256135b079fa9ef93dc35198a12587fd274e71f1ae5b90642c2831c515e5f93cd89
SHA51206200ddf4fe1b90bc027e7e97d734a1e22c3e95b79563bd42eb3292a4ff3d5ae00f68bccb28ca492fafcde4d805de2a00cc8b1c10b790f02c57da027c5178c02
-
Filesize
4KB
MD59c722f25a8dbebf478fe9c7f604d4d8d
SHA129812408535deb1d03e451ccb2c5d23a8a3d477b
SHA256c4972b0ac5133cd9fafad8d34292fb147d6ee3e27cc221edb8d45a388f562e58
SHA5126bd378f448738fd211d433ebc280c46407f726c46abafe230cda6a31faa06cb761f08ba7181755c16510baf2e978f61eee5b1dc28006873209ede9f4e043cf73
-
Filesize
4KB
MD50667e61e8796f73300be6edd4fa21e13
SHA1b0b0039b8fad7257c73a84c7ca0094f5abc159d3
SHA256788bf3db599cdd2ae824def082bf61dfc1363bdc666004de17e83bf5c4499cac
SHA5125362f6fd1e7a225c41efd520b4eb8f11209aef7236b3da78534e309b52ada9fa78d68c78b3be1e4f1f9e97b302ef37b0077419df72b206823045f7dc5fe0ed68
-
Filesize
4KB
MD5cc69a48b23709587e1cbeca572ad7982
SHA1fba51280f56fc985efd35e2c4aba4a22af0004f9
SHA256535fda16741f2de6184a8763d2938da55093652d1c9554aff54f6e686ad40a1c
SHA5124f9c9eb78690a28125f1fba7fc3c1a61b185208687b0dfd53e62962878a97104305948fd72c42adc6be0ec5627589ccd53157cdefd545fe7b8226cf788b18cb3
-
Filesize
4KB
MD528e3e7bfe427b5381238117988e10132
SHA1dbcfbf0c3803f1022f9d48a605dbf810f8ee0cbc
SHA2569536fdeb782999fa648c3eaeac81eb83a11a15070cfae779681def8eac0e10c0
SHA512ab64fb6bedad2ccbc1a746ac64cb14be5333f4b288cce5892fbf0f3446d4b376329948197ed53a45400540abfe13bfb8b7e61ac714aa790e3cf3ae5d88392d6e
-
Filesize
1KB
MD5a2b54217c461936d8cc78d511ba465f0
SHA18772be986e77cca000f2fc970e6da7358fc65937
SHA2563e50cfc6da80522cba2058ae5fbcea210427d19f055b825e954eba13bff28530
SHA51299933e828406a9b28e6755665c45dea20e76c1c89963480e6b76f4806208f56936d962819c2278e9a8ae66bdf308b33b68d6f5d18ed94fb053cdf5018a611f97
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD57327fdacd0d2952c4bcac026a87ce3ee
SHA1c92857d03d443fea7c90d257b64699c1d86d90ab
SHA256fb65f46309c842110754f12f29d84bf5150e1850b2e905f2b550a132887537ee
SHA512fcf6f04dd138aae80d0cf8cdb12ed6cd6c0c6634e027262de21f9331af5dafab9fa382af26eb8c55e85e0ac9ba30cd324f908bf19fd3dc3d945e2d6ab4ee40d7
-
Filesize
2KB
MD553ccbb8e5139cb545752c3557313b028
SHA12dfdd28afcee286f586da4b557aa6b3137dbeb41
SHA2568884b9825e9fc15bf8283238bf53531560802c93fabe62c3e5468f7ddecd990e
SHA512bfd30d48c72b8011ed9693768e7a1b9b42b0d4a889ced4d2aaf62759cbea614a3b4b3611c7ef8d046a9aee76e469cb2aba74b19cc31b16a9efa25ed24c4e83c7
-
Filesize
2KB
MD5b81621172312db78c65b811b9a6ffec9
SHA18eea33f4a2e727e36982ed61ede454b554b7e6e9
SHA2569bc9cd09c9395b9183e7c894d2b22237ee1118e989c652407e93e3477fb52b9d
SHA512ce6da63b26766dc00ec8a01d018b343ade0459d306cbdb2e5f934b7c6a9756f9d805742429286c1583919c0587a1dc81e274aa5a5d6e8638d4ad382bf8c44353
-
Filesize
2KB
MD5a5a3f70dff5ca5ad7098d1bb24e710f0
SHA1803b8456dc535d4c511c0a0d1b4b5ce1dcc69f88
SHA256be22919e82e29e9492124efb6ed7841095de8bb0c52f5c4eae3eca9ec6715ed7
SHA512a18508ba0bca50243b11da2b0fd8d9ee5d795067a3a88bcb3b8a3b413c88b1c6a0fb5b4b60f67538113599151fd03e9f3f58d6b82cf83babaccfe6d560fa5e0c
-
Filesize
10KB
MD5ef6450be2f850d5c0ca3b5b884f74bbe
SHA1827a5396e8225077a253b5ec1b4e498492a438cd
SHA2563c14bfc757c50f03db54d58495ce45368a4ff5462f304e4e8e25175f6652f06a
SHA5124493612f8db93662c732cbb06d146268daf0a01cb4cfedc0e7d2ef1c9a4766e4bc1a2a70331cae86c712338f7cd77e698b55ce66a81d4e9decf87ee602941f31
-
Filesize
10KB
MD5e80ec3affc0dbacdae22e63e41232ab6
SHA1e0cece269b9ed3dfd52da994d9212c8ef8ab2807
SHA2562ac2e9ed64d96f7a0ef26e8c843c436ea3ba6256808b2a84e430c6d0aee49aef
SHA5121037632c3f3b93ab4c76f21e2ed1d8eba456f6594572ee9f394877b3cfcafcee2255edaa0c7db4c290256dbeb1fe01b620abbe2a191fadb0122fbeb7a5aa5652
-
Filesize
2KB
MD5cbb9e3bb33847d02a60a9d6bb9505c6e
SHA18a28a3b4249cfae4a419671a9e2f516a73777394
SHA256c43f198c62363e567500fe4f5f06b1e00a4237a37a95a19981775523ac07c319
SHA5128194c7de75f0c2a5297c416f0674c9068ad8e9445eee5fb5930c1f141624608073429f058f45efef8e3ce34a3be16e17fd499837ab0c75b933ecec72aeec0fd1
-
Filesize
2KB
MD54d2f907b7c48994acc568d91f4769f9b
SHA19c6cc1a1a9e05e2b0632e46f0a3bce8169bde2a3
SHA256cec5cc1144310c3fe4a86679dd02e210a83a8f175649d3ebc584f451a44630ed
SHA5124eb8f61b9851fb8a2b5506f22c03ec86b5adda9a097aefc1a0b4026e6f43cd3eb95066e1f3ffc63359d45a38b1e58bd901bbc225bcc7796889ff75a2b4fd3303
-
Filesize
429B
MD50769624c4307afb42ff4d8602d7815ec
SHA1786853c829f4967a61858c2cdf4891b669ac4df9
SHA2567da27df04c56cf1aa11d427d9a3dff48b0d0df8c11f7090eb849abee6bfe421f
SHA512df8e4c6e50c74f5daf89b3585a98980ac1dbacf4cce641571f8999e4263078e5d14863dae9cf64be4c987671a21ebdce3bf8e210715f68c5e383cc4d55f53106
-
Filesize
89KB
MD5ee1300a5dd8b53671d572ab4fba80990
SHA18e43b74b5ce61359414ffe2bd19a427a668fb99d
SHA256306246151c2aaa6c9136b1e5cbb778fe8fefa79b0b6f6052a9d93654455748f2
SHA512e0d26d26ec10b76cf7c17c07ad6ea5339fd205035c540721f1e0d5244f4a08df734d2a656a1fde9b0184ace2919b8e84cb6acc64a95cb09a0de9ad66cb2118c4
-
Filesize
1.4MB
MD5c21bff299a662c17af5e4e9730b3a464
SHA1bb4b4a94887d9f5694a153de935718091e6d083f
SHA256735390b07d329a0474622e85810f58c274b467c311ea35d714ec26b324e7286d
SHA512f2581ff93b40e5dffbc87c999e969eee3f82d31ffd23612fe1fd4d35eb2fcbcfad7bf5c65e882b3e7a39ac89567e1efaba67d9c787664968444b00f706ab67a9
-
Filesize
183KB
MD5738b51e076e429595bd12a2e4408dfdc
SHA1f2f44f0ec7f2a30f5b9d34396222a4072afe06d8
SHA25682ec00e88797ff182391e628cb89c05954d10862180a51581d18e7b24fb11c70
SHA5120e72969b1055599191eb37a52f9cd9db2f293cb7fcef044aafc133ad6bb8962dc92383477780ae6c0fb5909be9037b7ff1ee5eb4332c723e3b045eb62e6235e1
-
Filesize
1.2MB
MD5c9e0455ac52ff3674fb40c1bd95be627
SHA18cc144e6099bf369fe127dbb9dc4b7c4d64e01d1
SHA2566426531e3ccffa7e54b3d1ddaccf90f9be07bbd14a2cb2eccba6ffc6f21c3cf9
SHA512c3b640661d926f880e3f953a9908d2fa7dd8bf595966378047744edf32f5c8f9ce39eb77486b51950af43f77f6c9c3a61f8bd6620cdb12aac1c18e339e07cf6f
-
Filesize
220KB
MD591dd120c48de1c13c0adb40c898eeadd
SHA12f81abac3bc154c1b23ef9c64eaa26d283bf96d7
SHA2562af9ac83822ebf1c70e13069485566a8c6de06b49fd8b1328d624e18f182baa6
SHA512aa76db91b1b4d78191d15572de98fd1d6c062bc77c7a04f8c9ad5a2f3b953f991312a4ec6fb185dfe80360fb0d62faa42ab4fbaf3e8938c5dc9f75959c46ab92
-
Filesize
1.0MB
MD5930c9606d878de024ddbfc1796be7e25
SHA1caf393ff6309da91a9ee2a0b1a85392ee40b338a
SHA256f8bb6501ace2dab679aeb9b059589d4ba9594e742698566fc3dcd8ffdd47a97c
SHA512067815bdc6e6f42fa8467f38fefbdeecbd19196f253b1cd38e32421e10158333b2de17bee79508fe65bad2a520822dd69fdc5c728d3925d35794a6ba4da4f19e
-
Filesize
1.1MB
MD5b39225654be17d5e910f2e2359f88a8c
SHA188031db122d99ea5c11b706443e749ae374de921
SHA25606a9d4bd4df6eb615a8e2d7f686cc737267e43f8f3d827dff23aa481af54ce90
SHA5122a88092f063e33791d9f0548c621d36151bfe13af78298b40d18a341c34680592b56fc4056956edcf289d63e82bcfa9b7803a8333d999c4feabc64a962f76acc
-
Filesize
644KB
MD5e2ad39836d26dcb10f1c2b7dbbe0d29d
SHA15cc73651ab9bd102748b6f258f1d9ae4e4a85ed7
SHA256ebb37545477d13956134bdc85ec9117e246a8eeae26d57547bbad786904fefa9
SHA512a0f54750a501af0a1f0465dcf62a26baad7c13370f53aff0f897744bb501399e698cdbcac9eb394f9bc78c6e0ce1cf7a66b0a16ca7dcc97441fe9a67bdd7629c
-
Filesize
30KB
MD529a026f2a8fb2fd9926fd148daec38c5
SHA1d2dbd72c0880bc77aea1674b0d9628fcf5484139
SHA256424b5c218c2a54ebbb25395711bf85924aad37c675fe964859744b3e9abdc1cd
SHA5124b48e3a0f7d8d2476933028ae2a532d8191a71f7b89347db446e47d02ac0cbd0eb462e6ebf71e7ca02d7626242c4868af097662c59fc8697a42c1faca4514189
-
Filesize
519KB
MD54bf94bf61623e0009200e74f8886b239
SHA1ad683edadec0b9f78d21630dea229f3415bd4079
SHA256ddacf06f1812f28852d64374d06b618a2295750f8e1f531448baa1383039cff3
SHA5127a94111aca0eb28191b009801ff24e11bf1581ed5d391295596a2eb412488c0fcc02d4a6f2f7817fc710771673748f4353add79d97d5eb94bb44c045c2289e6a
-
Filesize
878KB
MD51ab8e21fceafd5b33bf584624e214315
SHA1f16f55852847dc2000616b9f9fd967c3e1144539
SHA256e666327d4a588afe16a3686e4cc42aaa0c402bf1c8c200f3d1fc8ea464b85543
SHA512bbdabfcd0dbd76151b186d2f0b511403c99de4ff8c27b43afa0397a123016aa6caffbb0ded81a149da3d8a38868e3a0583af146aef3766ff9e337fcda34948b9
-
Filesize
1.1MB
MD53b252f531eb5412826dcbaa87f0170ee
SHA11a156beefa2b445e51e9e90f9d8e0f19622f92b9
SHA256f2551ad4bc381cb957fe3117faef53ad7e0bc2ecb425ff8d36326eaa4d3d0b42
SHA512aec6f2b3e58adaa94cd017bbd0ca65a47a4e69420dc1eb9f0ad907c3d1d84bff1cbde4ce5632920cdd606710d389affd7ab4692e4e2219c53ebe7dd67360a6c5