Analysis
-
max time kernel
966s -
max time network
946s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
DiscordSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DiscordSetup.exe
Resource
win10v2004-20240221-en
General
-
Target
DiscordSetup.exe
-
Size
91.7MB
-
MD5
4284989e0e4855f3192787e17d052559
-
SHA1
f44ce02d81b0c7ff01e6e103c9601f9a4af3c7e2
-
SHA256
4f00e52b67df81eae3af2de34c38a6d02cb215341c02b7c4c9427a3f3f044758
-
SHA512
47e63f6d8e04595c2e4b026e4228447a3112dddfa35d6055a701d24d33d491fe463a3fe5dec0db50d1b3a21f15d8f29e89853b8d9f97aa253d44dd9ac4490f40
-
SSDEEP
1572864:cj+KJ0shd3zsMNOJlLLp19n/chn4O7seo+ARYZKWKIbAU+Z54kz4M:++KJz3I7XLLpLn/ch40Z/KJ2bMf
Malware Config
Signatures
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Discord = "\"C:\\Users\\Admin\\AppData\\Local\\Discord\\Update.exe\" --processStart Discord.exe" reg.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation Update.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation Discord.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation Discord.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation Discord.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation Update.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation Discord.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation Discord.exe -
Executes dropped EXE 18 IoCs
pid Process 3464 Update.exe 2884 Discord.exe 936 Discord.exe 3392 Update.exe 2960 Discord.exe 1044 Discord.exe 228 Update.exe 2620 Discord.exe 1180 Discord.exe 4836 Discord.exe 3076 Discord.exe 3196 Discord.exe 5336 Update.exe 5192 Discord.exe 5676 Discord.exe 5564 Discord.exe 5508 Discord.exe 5484 Discord.exe -
Loads dropped DLL 28 IoCs
pid Process 2884 Discord.exe 936 Discord.exe 2960 Discord.exe 1044 Discord.exe 1044 Discord.exe 1044 Discord.exe 1044 Discord.exe 1044 Discord.exe 2620 Discord.exe 1180 Discord.exe 2620 Discord.exe 3076 Discord.exe 4836 Discord.exe 3196 Discord.exe 4836 Discord.exe 4836 Discord.exe 4836 Discord.exe 4836 Discord.exe 5192 Discord.exe 5676 Discord.exe 5192 Discord.exe 5508 Discord.exe 5564 Discord.exe 5484 Discord.exe 5564 Discord.exe 5564 Discord.exe 5564 Discord.exe 5564 Discord.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 21 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Discord.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Discord\\app-1.0.9034\\Discord.exe\" --url -- \"%1\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\ = "URL:Discord Protocol" reg.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\URL Protocol reg.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\shell\open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Discord\\app-1.0.9034\\Discord.exe\" --url -- \"%1\"" reg.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\URL Protocol RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\shell\open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Discord\\app-1.0.9034\\Discord.exe\",-1" reg.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\shell\open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\ = "URL:Discord Protocol" reg.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\DefaultIcon reg.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\shell reg.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\DefaultIcon reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Discord\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Discord\\app-1.0.9034\\Discord.exe\",-1" reg.exe -
Modifies registry key 1 TTPs 9 IoCs
pid Process 4448 reg.exe 4116 reg.exe 2060 reg.exe 2444 reg.exe 2280 reg.exe 3300 reg.exe 444 reg.exe 1208 reg.exe 4352 reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 Discord.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 0f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f53000000010000007f000000307d3020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c009000000010000003e000000303c06082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030906082b0601050507030106082b060105050703080b0000000100000030000000440069006700690043006500720074002000420061006c00740069006d006f0072006500200052006f006f007400000062000000010000002000000016af57a9f676b0ab126095aa5ebadef22ab31119d644ac95cd4b93dbf3f26aeb140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c7f000000010000000c000000300a06082b060105050703097e000000010000000800000000c001b39667d601030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47420000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 Discord.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Discord.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2884 Discord.exe 2884 Discord.exe 2884 Discord.exe 2884 Discord.exe 2884 Discord.exe 2884 Discord.exe 2884 Discord.exe 2884 Discord.exe 2884 Discord.exe 2884 Discord.exe 3892 msedge.exe 3892 msedge.exe 4520 msedge.exe 4520 msedge.exe 2620 Discord.exe 2620 Discord.exe 2620 Discord.exe 2620 Discord.exe 2620 Discord.exe 2620 Discord.exe 2620 Discord.exe 2620 Discord.exe 2620 Discord.exe 2620 Discord.exe 1676 msedge.exe 1676 msedge.exe 5024 msedge.exe 5024 msedge.exe 5384 identity_helper.exe 5384 identity_helper.exe 5192 Discord.exe 5192 Discord.exe 5192 Discord.exe 5192 Discord.exe 5192 Discord.exe 5192 Discord.exe 5192 Discord.exe 5192 Discord.exe 5192 Discord.exe 5192 Discord.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 2884 Discord.exe Token: SeCreatePagefilePrivilege 2884 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 2620 Discord.exe Token: SeCreatePagefilePrivilege 2620 Discord.exe Token: SeShutdownPrivilege 5192 Discord.exe Token: SeCreatePagefilePrivilege 5192 Discord.exe Token: SeShutdownPrivilege 5192 Discord.exe Token: SeCreatePagefilePrivilege 5192 Discord.exe Token: SeShutdownPrivilege 5192 Discord.exe Token: SeCreatePagefilePrivilege 5192 Discord.exe Token: SeShutdownPrivilege 5192 Discord.exe Token: SeCreatePagefilePrivilege 5192 Discord.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3464 Update.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 3464 1516 DiscordSetup.exe 88 PID 1516 wrote to memory of 3464 1516 DiscordSetup.exe 88 PID 1516 wrote to memory of 3464 1516 DiscordSetup.exe 88 PID 3464 wrote to memory of 2884 3464 Update.exe 92 PID 3464 wrote to memory of 2884 3464 Update.exe 92 PID 3464 wrote to memory of 2884 3464 Update.exe 92 PID 2884 wrote to memory of 936 2884 Discord.exe 97 PID 2884 wrote to memory of 936 2884 Discord.exe 97 PID 2884 wrote to memory of 936 2884 Discord.exe 97 PID 2884 wrote to memory of 3392 2884 Discord.exe 98 PID 2884 wrote to memory of 3392 2884 Discord.exe 98 PID 2884 wrote to memory of 3392 2884 Discord.exe 98 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 1044 2884 Discord.exe 100 PID 2884 wrote to memory of 2960 2884 Discord.exe 99 PID 2884 wrote to memory of 2960 2884 Discord.exe 99 PID 2884 wrote to memory of 2960 2884 Discord.exe 99 PID 2884 wrote to memory of 4448 2884 Discord.exe 102 PID 2884 wrote to memory of 4448 2884 Discord.exe 102 PID 2884 wrote to memory of 4448 2884 Discord.exe 102 PID 2884 wrote to memory of 4116 2884 Discord.exe 105 PID 2884 wrote to memory of 4116 2884 Discord.exe 105 PID 2884 wrote to memory of 4116 2884 Discord.exe 105 PID 2884 wrote to memory of 2060 2884 Discord.exe 107 PID 2884 wrote to memory of 2060 2884 Discord.exe 107 PID 2884 wrote to memory of 2060 2884 Discord.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\DiscordSetup.exe"C:\Users\Admin\AppData\Local\Temp\DiscordSetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe" --squirrel-install 1.0.90343⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exeC:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\discord /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\discord\Crashpad --url=https://f.a.k/e --annotation=_productName=discord --annotation=_version=1.0.9034 --annotation=plat=Win32 --annotation=prod=Electron --annotation=ver=22.3.26 --initial-client-data=0x53c,0x540,0x544,0x530,0x548,0x8805d78,0x8805d88,0x8805d944⤵
- Executes dropped EXE
- Loads dropped DLL
PID:936
-
-
C:\Users\Admin\AppData\Local\Discord\Update.exeC:\Users\Admin\AppData\Local\Discord\Update.exe --createShortcut Discord.exe --setupIcon C:\Users\Admin\AppData\Local\Discord\app.ico4⤵
- Executes dropped EXE
PID:3392
-
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --standard-schemes --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=2100 --field-trial-handle=1984,i,10063697456180906310,10205929828074165704,131072 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960
-
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1984,i,10063697456180906310,10205929828074165704,131072 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Discord /d "\"C:\Users\Admin\AppData\Local\Discord\Update.exe\" --processStart Discord.exe" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:4448
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord /ve /d "URL:Discord Protocol" /f4⤵
- Modifies registry class
- Modifies registry key
PID:4116
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord /v "URL Protocol" /f4⤵
- Modifies registry class
- Modifies registry key
PID:2060
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord\shell\open\command /ve /d "\"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe\" --url -- \"%1\"" /f4⤵
- Modifies registry class
- Modifies registry key
PID:2280
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord\DefaultIcon /ve /d "\"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe\",-1" /f4⤵
- Modifies registry class
- Modifies registry key
PID:3300
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault30cbc5bah16d6h4de2h98c0he0b25e3ae5561⤵PID:4592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffcaa1846f8,0x7ffcaa184708,0x7ffcaa1847182⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,12438356033258759639,2840479032119466855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,12438356033258759639,2840479032119466855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,12438356033258759639,2840479032119466855,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:4520
-
-
C:\Windows\System32\SystemSettingsBroker.exeC:\Windows\System32\SystemSettingsBroker.exe -Embedding1⤵PID:3728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:3924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultbdce4282h184bh4960hb182haf5b48ad16651⤵PID:4496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcaa1846f8,0x7ffcaa184708,0x7ffcaa1847182⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1808,15656909793574064817,8463369593845703578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,15656909793574064817,8463369593845703578,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1808,15656909793574064817,8463369593845703578,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3180
-
C:\Users\Admin\AppData\Local\Discord\Update.exe"C:\Users\Admin\AppData\Local\Discord\Update.exe" --processStart Discord.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620 -
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exeC:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\discord /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\discord\Crashpad --url=https://f.a.k/e --annotation=_productName=discord --annotation=_version=1.0.9034 --annotation=plat=Win32 --annotation=prod=Electron --annotation=ver=22.3.26 --initial-client-data=0x548,0x54c,0x550,0x53c,0x554,0x8805d78,0x8805d88,0x8805d943⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1180
-
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1888 --field-trial-handle=1956,i,17369898431150727199,17374383316258594419,131072 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4836
-
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --standard-schemes --secure-schemes=disclip --bypasscsp-schemes --cors-schemes --fetch-schemes=disclip --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=2052 --field-trial-handle=1956,i,17369898431150727199,17374383316258594419,131072 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3076
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord /ve /d "URL:Discord Protocol" /f3⤵
- Modifies registry class
- Modifies registry key
PID:444
-
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --standard-schemes --secure-schemes=disclip --bypasscsp-schemes --cors-schemes --fetch-schemes=disclip --service-worker-schemes --streaming-schemes --app-user-model-id=com.squirrel.Discord.Discord --app-path="C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --autoplay-policy=no-user-gesture-required --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2884 --field-trial-handle=1956,i,17369898431150727199,17374383316258594419,131072 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3196
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord /v "URL Protocol" /f3⤵
- Modifies registry key
PID:1208
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord\DefaultIcon /ve /d "\"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe\",-1" /f3⤵
- Modifies registry class
- Modifies registry key
PID:4352
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord\shell\open\command /ve /d "\"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe\" --url -- \"%1\"" /f3⤵
- Modifies registry class
- Modifies registry key
PID:2444
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x78,0x108,0x7ffcaa1846f8,0x7ffcaa184708,0x7ffcaa1847182⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2752 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3532 /prefetch:82⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7659463918540447202,18305050122178190534,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3532
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:1208
-
C:\Users\Admin\AppData\Local\Discord\Update.exe"C:\Users\Admin\AppData\Local\Discord\Update.exe" --processStart Discord.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:5336 -
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5192 -
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exeC:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\discord /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\discord\Crashpad --url=https://f.a.k/e --annotation=_productName=discord --annotation=_version=1.0.9034 --annotation=plat=Win32 --annotation=prod=Electron --annotation=ver=22.3.26 --initial-client-data=0x530,0x534,0x538,0x524,0x53c,0x8805d78,0x8805d88,0x8805d943⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5676
-
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1932,i,51433379354408089,8576858621828460084,131072 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5564
-
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --standard-schemes --secure-schemes=disclip --bypasscsp-schemes --cors-schemes --fetch-schemes=disclip --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=2020 --field-trial-handle=1932,i,51433379354408089,8576858621828460084,131072 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5508
-
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\Discord.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --standard-schemes --secure-schemes=disclip --bypasscsp-schemes --cors-schemes --fetch-schemes=disclip --service-worker-schemes --streaming-schemes --app-user-model-id=com.squirrel.Discord.Discord --app-path="C:\Users\Admin\AppData\Local\Discord\app-1.0.9034\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --autoplay-policy=no-user-gesture-required --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2576 --field-trial-handle=1932,i,51433379354408089,8576858621828460084,131072 --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD531f38e2dfd5b207f7950a15890fa6c4b
SHA14a4960b4ca5ec38e1b2434388e4b882b95a42524
SHA256387a63952b8d2f11950a9ffe9606bf4b31f77b5ddcf31354aacb7922f9856a2b
SHA512a690db083dbdac7ff5390ac36fb4a24d4fb847a9d954583c4a1c7fb4b9ca09eb3a290337cb3ffcc9afffb799656dc217321170b6fc25cacba7019c8f097df5e9
-
Filesize
1.2MB
MD5c3b6b6065d285fb6054a0b4c53e1c763
SHA1eb1c3d37b080bd527b7ea0ed5ff06be06de95bec
SHA2569e9685e685a8853b0bbb339973cbf5591cafb5303599163e6b92354704efdb1f
SHA5129fd50721d21eda8fc035deeb18b84fe9aa12d17ae06d5263ab44eb4d8273495284a8dfba8403f6155f0b467ba28f46c33858500c647a9650f7e5da6c9a64f637
-
Filesize
1.5MB
MD5fd1d283fb1b9f739ca721ae52192d019
SHA1ad8eb7d1377eb442ae5c9a1a5f9ae2d6906cab4b
SHA2568d54282979e0205e9a66df74124f27f4df43930c6684fadb7596d907e5ec41a6
SHA512c9d62e34e2db0b1955ebe6b59e9934d56461e889b248387ea4c328da846d0e8ddc24d35428bda5499fddecb022adf2f065e76b2e575286a737b8f8c53edbd420
-
Filesize
381KB
MD5ecb5aceec1c4cab0baf3891a02283a2a
SHA1a0e26e69ddbab3baa1e6c2600013fa031ecebd80
SHA25633ad9d3958b0d9187710f5000e798a4cdd1244d85e32fc3651902d27dd92a52a
SHA51284537e9cf02d6cae2d20752e980f24b69d81bfea6a49f5f95bcbb0b5c3972fa738302847d3a8f4ab8394f223864e12f9edb7c8260f42097a076b1604fe16a138
-
Filesize
3.8MB
MD560c6d1b10194a55c9b3c25d8cb3a324c
SHA182779269bfdb2f2dd1ed8979b523744ef19ae44c
SHA256ad427e6e4d7ad5a9dc610c79e0c54e5d5dc511da70834711b7640aabcb42b0db
SHA512955057faee434eb56c4508d92c11beb9fd80466cc6becb357f11f5c55832255ff92dac7a320262f44fec310a22471f381462c5d37e7e64c9d53d37571b82ad51
-
Filesize
3.1MB
MD55171b8f3d0c2d1eab1e9f54221be68d5
SHA1a135821d435542ac622817953719c2d842605ce6
SHA2566fcf8e226aa5bc06abac028be4804bea19baff553eba1ef626ee0c6a4ac06033
SHA512a4f1b60cf6a58f7d3a92c8acd703ad84f9973569c76849e4f0c28bb88967354f1996df35458aa9a6e301ab7864b057771277eb963e53cfb0db7ae767837fdf9a
-
Filesize
2.1MB
MD53b1abfe6811cb7c6f3766481c0cadc25
SHA16a594f59dd9cff5aa52a8e7ab04203725b2f7020
SHA256df87e61d5f03135a4581d65f972dd549e01283f82580411003c600b5f06323ef
SHA512b0e41b0382c021263bf9bdca1c4345880a05b33d21dbffe1e64e29c5d527309d64a65fe20235d6d914f449cf7d41d5d7d6384b76384bb283cff98a9dab5ecfa2
-
Filesize
640KB
MD554788bb78c238fd0f4459c16de22f0ab
SHA11cf394d3a73b5f2d810463bb9302dd8b72a4ca12
SHA256418496e961f8b330da79a073b805952ec231094dec8cab162feedc52e966661a
SHA512ace9f35422c79065e99fd3ec8a1b0145fc8a70ac0df6496e940db2dcfa296d6f2290d7729447e3177c189e667ab1f80bd53f7e48c62ebd75640d5170a8fc20c0
-
Filesize
9.2MB
MD5ad42f32139b817ce44cb2ca9cf2acd98
SHA130ba65ea2c4fbc4c83f265018d1d8f04b18a8a8c
SHA2563de746eb489410f1a1bbaa46de52b5bf0aa515fab7406a050fddfbcf1b64a115
SHA5120c7093ff0ed73e7c9b4790d9da6bb53b152f71f76510a7faf847981ff9a811378cdc0d8186fd7e8e0852fa31779c4c47721c9e525c488d099455e2866c96cae5
-
Filesize
3.2MB
MD54a2febea2be9c4f71f3c0f2c6052fbbc
SHA15bdee8483304aeb2bb3a14fe033e9c5f4fc677eb
SHA256929fe13d389691c3ed5c457e6571dd4d11fca1ed6a0d0fde8a2c8dbddf3ddd56
SHA5127fb4681c5ffd01f77bc316dc8e6db48901a3d4c068cda41fccc277955fff4ef911c8ad5bdd18ccb08bef9e39861687231864391558c6293ef43f225f5a801529
-
Filesize
278KB
MD5084f9bc0136f779f82bea88b5c38a358
SHA164f210b7888e5474c3aabcb602d895d58929b451
SHA256dfcea1bea8a924252d507d0316d8cf38efc61cf1314e47dca3eb723f47d5fe43
SHA51265bccb3e1d4849b61c68716831578300b20dcaf1cbc155512edbc6d73dccbaf6e5495d4f95d089ee496f8e080057b7097a628cc104fa8eaad8da866891d9e3eb
-
Filesize
126KB
MD5d31f3439e2a3f7bee4ddd26f46a2b83f
SHA1c5a26f86eb119ae364c5bf707bebed7e871fc214
SHA2569f79f46ca911543ead096a5ee28a34bf1fbe56ec9ba956032a6a2892b254857e
SHA512aa27c97bf5581eb3f5e88f112df8bfb6a5283ce44eb13fbc41855008f84fb5b111dfe0616c310c3642b7f8ac99623d7c217aecc353f54f4d8f7042840099abc5
-
Filesize
175KB
MD55604b67e3f03ab2741f910a250c91137
SHA1a4bb15ac7914c22575f1051a29c448f215fe027f
SHA2561408387e87cb5308530def6ce57bdc4e0abbbaa9e70f687fd6c3a02a56a0536c
SHA5125e6f875068792e862b1fc8bb7b340ac0f1f4c51e53e50be81a5af8575ca3591f4e7eb9239890178b17c5a8ff4ebb23719190d7db0bd8a9aa6dcb4308ffa9a34d
-
Filesize
3.6MB
MD5aff39dc256b7063ccc72cb26468eae66
SHA19bf9d871566d25b7bed13e24393b4784f2d5804e
SHA2561e484642819fab80e006be18351820072f47804e55ffb3073b37df0cad544053
SHA5128a71df21ad7c00f6e194f833a3ee447269dec2a28a5d4a106496bab120381cb22178cbf80c0a323d930eb655bc23af7e384a6e9afc4405d8f05d3d5b53b91cfe
-
Filesize
3.1MB
MD5b6caf2692ad9bb4d79785238f7dba484
SHA17915a5bd4e9ba31bf7caaca17fadcf303c74566d
SHA2569c37f1a940b61a578d13263481fd2e883072ea9d19bdd31f1e752a41eab1c5e6
SHA5122a212f09ed449c49a88d7f64b201bd4646bd43ce08f306d1a93c2afe674858c9447ef4534d5487875a3892928b31d81643b2b7335f8c7d1c6499ab9d3a82cc72
-
Filesize
512KB
MD518abc9a40648cf1765fd971b225f0d20
SHA19847a9bff9e2b5682881898881a90ce955f762a4
SHA256cc2d61fd5dac0da8e0bcb5b8237e62d3cfa968adc6f690bcee08777c4a6b758e
SHA51229ff997e23e28ac09df9f2acfa054f536bb7da0b050d65edef438aa93651ec83487b25d8479b7fff84fdc432f2eb5c2ab2be62ca1ae827128e69c8da22c81fdf
-
Filesize
1.4MB
MD54cd1cd6ad1aff77824e2bf5e9f02b725
SHA1b7e11171c622bd356ea994062dbdc2bbd56e6c8d
SHA25619895283068cb8a7c70068d4a9aae9e1be0f716a144849ecaa1cb1c13a8e4f54
SHA51227c9871fe77fc83ceff9d93b9852ae87bd98a18ac8c82392544d881d4aea5117b3cbde68410fcafbb8238a59b133fdff77d09c698f7447752eb253115587e81b
-
Filesize
3.5MB
MD56029c444f088b1e7c4e4017fc2b893d7
SHA1930e68d4ba73d5254784a3345618d331fdc4e13a
SHA25693c6b19d18087a505550b1cb36e5f001e80455935f29365f44064f8fb6b8f3ad
SHA51208654e6c4e1d7f9def37545f039259401bce50894323631ad64b3409efe2da3f036335d66cfc36bb9894edf223cfb4a6cade095ad73b9dbc63331fb13e4fc421
-
Filesize
394KB
MD5f55234f2e0be3d2c04fa3a67acf39aef
SHA1916a45202211b7ad5f50f086fdb79df20a9bd474
SHA256d2d19bc14d075cdb52232d44c7ec13a8d34a20a76a1f9b7e325562876f7d35de
SHA5120e951e7d13b9176a9fc7a7c83f1b306621bfab16509aefc83977e16e7e978999a7b58548a58581ee28b4128cf3b1a7e9ee60683d8fbfc0391c52bd6bcc1e36c4
-
Filesize
1.2MB
MD5f5fd0bde8fd41a0ec205507b97b9198a
SHA183bde7bd5d53608ffb8c4dc105b00614891d4443
SHA256d4a826bc3549cce9f0fd8604707a68eca6c82ae1b29ecb27527485617c083844
SHA51207fc7caae2fdd2e9386d30badeed94ddc9cd9ee21d82663c13b94c86e4761bb19bab584d26f48e04e35d290073dbd6b49a71eeb35264d318d6f9a72e1498defe
-
Filesize
3.2MB
MD5ac63b7fb7c78da555c903c903c96e846
SHA1457862ddad83381b99df63b9ecfca6f7a8394a68
SHA256899d1718bb50eb3b442f373fbf26f2c2768131defa0338204fa1b192af0aa373
SHA51214579729c126dd6c87b3298b532a4a12e547824d49af7d01a93823e894a9dc75d359a00a34e9c7c3e38bdfb22b0a20b52ee45b064d1527c42c73eec1cdb45b10
-
Filesize
313KB
MD53f6f4b2c2f24e3893882cdaa1ccfe1a3
SHA1b021cca30e774e0b91ee21b5beb030fea646098f
SHA256bb165eaa51456b52fcbdf7639ee727280e335a1f6b4cfb91afc45222895b564f
SHA512bd80ddaa87f41cde20527ff34817d98605f11b30a291e129478712ebebe47956dbd49a317d3eeb223adf736c34750b59b68ad9d646c661474ad69866d5a53c5c
-
Filesize
512KB
MD5f75543a7d6c128a528ce00acdad30db8
SHA1ccfd3685615e9a1ae0a6563a2bcc1775d8c11df0
SHA25602a3281fcf1254717bdbcd5865120a3ac46c5da365f27228746a37b74b75990f
SHA512df34c8da7c6d1b802a7f80a30661f7cd252972dbdd5cfd55453b3112e18f0093af509207183bb5073cb0a21f92879e6adf9427be4be940390c7652e0f2ac59b5
-
Filesize
6.3MB
MD5c5d53638a017f91ae986ef30328243d1
SHA19c91da7b9b6bb994479679d0e01c372555cdc9e0
SHA256e6710756eeeac433df224584f84ca19d2537906143eb9b1c845e0af3ac45b145
SHA5120aa12b36aabda71e9701a462bdef0aefa96e51c450bda152f8ae201c8cc7fcec4adf869a8649e828897d316de2391510fdc1523fc376f5a39a9f3639fd6ef554
-
Filesize
83B
MD5bda0e192ecd5b268af1dbbf93c13a154
SHA1d6b7b2d7027065ece9ad48c9d3719b0114fa4745
SHA256317380e636c13649b2a612755b465680670f8b72afd54a31f02165247b2dba3b
SHA5123afee33b1503a2306d47b65b6d8f130cc14b7ec93129dda54696f42b20ecef57b68685ce4d2ced5928ad84b08a149d1c7ade0a7e55b538ab1efa218c62c3851e
-
Filesize
585KB
MD53f6f227dc46c0d5262cd6ca9bb7703e5
SHA1c8bc76f93cc6305e70f2041a52acfa6c44e9889b
SHA256869f5e88fb5e04840f035fc1c3f688e94499c8514bd053c9979413ebb8de4611
SHA512566394fef910b8edeb04c7f5c172ce9b361478275463f7eee4b5611536241431fa7638e47e5ac4b9df7467c98b120869b4e4f87e46628b40dae5685897cd256c
-
Filesize
1.2MB
MD50280592f8a115b6cd814c3336f9375d2
SHA1eb3423b4ce981427cc41aada47d174569b133ef8
SHA256060a2c67e2832328ee0781291c211aa2c665bc73ef85a603a9304921f0bf30a5
SHA512de03401fdc3ff3e66eeccd9e91ee4ea312cd0af6adffe2fa68b37a23002ee53aae5396c13bce7d836f486330c1e15a64404e24e192aa7e375a22fc07ef92edd7
-
Filesize
1.2MB
MD5686e22e798f37261a1e0879ef749957d
SHA1c888b332d8011988672ed78e25be9daae15dfe2a
SHA25613a850bb1d2cd8f633826dec64a5e1f8a009e9349d2d9bd50caaf13d7adbffed
SHA5125b692d3dd37d7caf54f9f8d7ee1579b87c5740a62725a213fa79f86453828757421e42fe4e2bb868bb44fc0818819edfa571ba33af6d312adba3f4663da40498
-
Filesize
3.2MB
MD510bd5bdfd5d4f51ce0199e13525e9394
SHA1b5015a553034f153dfd4484ae5e09cd584bcce24
SHA2565e3a771b9bbf12027677262ee19c85154b5eda097fca5247d558802d8ed741bf
SHA5128369463ad23a1fe854b2532f8426edc5f6812bd2f364fa5e99afd5cf00b2ecf41d910b67f18a2763f1d5acc9f19e7c96bc44e5e920d86178f9752114c1f46192
-
Filesize
1KB
MD56eb96c16eb677b6a8c1df381a0497a1a
SHA1d4596baadc2d4bee89d57e1718ab30c0b7d563ec
SHA256e96331392d474ca0fbc51036c7d55aa3a37aae6b074d50ebd106a277b0cb4097
SHA5123d472d56ceb73a3df3f65eff6af088b3a81ab553153cbda925091500a6543cf83e84872f2bc81f218deddecd8f3c9868d784c2fe08ece95f915138becaecfb0b
-
Filesize
152B
MD53782686f747f4a85739b170a3898b645
SHA181ae1c4fd3d1fddb50b3773e66439367788c219c
SHA25667ee813be3c6598a8ea02cd5bb5453fc0aa114606e3fc7ad216f205fe46dfc13
SHA51254eb860107637a611150ff18ac57856257bf650f70dce822de234aee644423080b570632208d38e45e2f0d2bf60ca2684d3c3480f9637ea4ad81f2bcfb9f24d5
-
Filesize
152B
MD558670ac03d80eb4bd1cec7ac5672d2e8
SHA1276295d2f9e58fb0b8ef03bd9567227fb94e03f7
SHA25676e1645d9c4f363b34e554822cfe0d53ff1fce5e994acdf1edeff13ae8df30f8
SHA51299fe23263de36ec0c8b6b3b0205df264250392cc9c0dd8fa28cf954ff39f9541f722f96a84fbc0b4e42cfd042f064525a6be4b220c0180109f8b1d51bbdef8ff
-
Filesize
152B
MD5fb478c669fa4763a6d96c024f3352ab9
SHA1c269824d6c485f45e4cd32b687957a714d3b8d70
SHA256ee9915e83669b5342fc49364730688e798a2d707398adddc3d388839379d01cb
SHA512b46d76f684760593347d37969e8c1fdd74fec8667787cc4efa1032a2bc27c3b6fa082bd385e5f4303bf8d9b63af573c582f8b96e7353213b6b6d729ea21f3fb5
-
Filesize
152B
MD5a5deac0a6d195e7be91ea6fde27957a3
SHA1e25c95ff824aafa31086dfd7f9ad66e5d78c3391
SHA2564a658ffb2ab687c86365a316cca8572a403ffc669fd5ae0d2dfe02271c7149b7
SHA512fd86b4a30bb9c360f22db94fccc505696bc6b0f58764a9607c3424c3941074bcb9f93be55ec698175a9ef917d8af478793632d5acb7ed31eafc17fda5a44a594
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\368bdcfb-89f0-43fc-b05c-a37f907dcd16.tmp
Filesize61B
MD54df4574bfbb7e0b0bc56c2c9b12b6c47
SHA181efcbd3e3da8221444a21f45305af6fa4b71907
SHA256e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377
SHA51278b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\89038384-a4e7-44f4-aaac-2c053afe7cf9.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
331B
MD5b3108ab64b8b56d0a8a32b614cbe3140
SHA1cdf24c9392c0c17b1f65866f660a0f40139f9632
SHA256c56b3d53a166000a45758583d20e2d4fc1b1aaefd72c0ba449acdb6e312aa4c3
SHA51266fa80318e38c60724927e03c0b64b5bec3d1897fc5bc0229873bb13a749d13f358a26b752622033150417e77bef521bbd24c0305ec18b2e5e596892daedf0d3
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
6KB
MD50a2500265ded27857b1229ee0b3f1ea1
SHA1a0a76e3ace4a5f2d10c4769dbe21c794a8cf084b
SHA256a6bfa9cf36909ed4d3b5aa94549a0b308d5781286300538207c46a2d8620f22c
SHA512f362ea85bae084d8d3c0c1fb3b837f374065129c9caaf6f7475f25db4f52e0642d8eab6699328cf7671a80a76374d3d0d515ca587f4fdeb71be095265289355d
-
Filesize
6KB
MD558766b528905b3309ee4a0e7eba9b150
SHA15a033e258e12adfda37f1271115dd1c17462d0ff
SHA256b41f31e049fbcc8cdc7eb48d8542ef0037802dd58132e208e058b85103486094
SHA512113676bfaf588635fdbc5e73f727b4ed614b3eb309ef01c754bbca6b8014c3949b1f6151b13abd3bf6aa62febc3802e51899f43ce0321d5872e2e7ba4dce71ab
-
Filesize
6KB
MD5f96091aa2b780bb5bf4c17b9943972eb
SHA1e9de878a07c1dc37c13588b1e52587b7873e48e9
SHA2566ad8c8e6401fe87fb7da00b002245160debaa7b73d26668ab38e8d5c2cc39b84
SHA512f71fb0ac0b5a8f73c1f2faeb85094aeba18ce54a139362373663ca2328ad9391005d0b62d9c009e86839fa9e529310d4b84cddfa1c531b52431a58dbdc999dad
-
Filesize
6KB
MD543770c346182f32a2617dac25208091d
SHA1d577d23cec9a0b48dd10554441e303af1da48747
SHA256153fb569f6f1a27834707006ec301eccb9f997a1a2219a20909eb2b443eb8222
SHA512c1e09f0a57d099faf36754f32507de28622a2cd325d22ab45603d029c5cd62a72a86a4c13e8fd33d79bf3dc6a1cdcbc2fb0583c1cfed5517053b12eef742f514
-
Filesize
6KB
MD523622e05585515f56921c812a9823be0
SHA1df358aeae2d36dbe28bff515550daeeef0079452
SHA25634eac000127e19fa625e39c5989539da6347e2eed6647352fc65c7dbee7daf92
SHA512e2d73eee6d8e849eb557562891dba8f642620e6df249f2e4b1430b891543c20ab3053021e49d8b2ff57c5f91b43e33c42eb51b2498cc915a30476751834d2636
-
Filesize
347B
MD5d8bbc2afe241060c7cb97bdc38f1dad8
SHA1144f245e6450b4965fdb3551e76072b13645d37c
SHA256af7f067adef835c2bdd800da409bc8ad7a43c9ab5dc278aedfd9601fbc237b1b
SHA512a8b20e88dd77cc83eeefb48a18291c450cd607d2b484860dda2d1afcd46db39f7fa3be4d750d4677ec856fa52fba118cf71937da4748149c8415d696ebe52256
-
Filesize
323B
MD575353eabab19f742138101836ab06297
SHA1d16af090fa5281f5f5f395002fd18e897df13c41
SHA25676fa9171af7136a2ce571d2f089707c44ef69699fbc6941649c165b09093f303
SHA5126dc8af9f013fbb9db4e785d876077b754f5be2ccfb3999e6ca48600315c908c25982ff6981303889b748bef2b29059a73ed5db024eb1756491a9507261e47fed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
11KB
MD5cf965e162473016f37da2f45698f966f
SHA1a71cfb1e12dd576568c750cafb9721c34d538f25
SHA25663c26bf1eb79eb0573046db958bb07b357fc07b1eed4d485c18a317d36d5a13c
SHA5120c32d2aa18d86160538ce1a1aa9a8f79da72d4926a0d03b37c26ee36277d9378c6d0f73c6191dfaeebc3e4c5968d282c6eeeb86730de2132d31d9993475dd49d
-
Filesize
8KB
MD5df86f850cba249723ea81ce22c481f94
SHA1cb765c3b53b6cbf7d0bfb1686c184efec61451bf
SHA256b6c7a294568c3ddf4c30db23a76c4196ed88c35a4721e2be4f40c0f271b6eae8
SHA5124d8ab703b813ab1fc6c4c4ed6903b5c5f3dd41eb10a1fec9982bf10eb148e8f637002f0ab0aa18c08924f7f5bf4682c95ab1b24fdda9ec0a96ad4dfa6cd16fdb
-
Filesize
8KB
MD50cc38efb1238fe43054975bfc67f56d8
SHA11d175f833bad5f04d36a2dd964eee2210536b67b
SHA2563e2f597e2ab58931419f450a214f88c538f037e2094b11041ca469919540efad
SHA512b776ae90a74f47adb7ffda7ee61264cd9510108a80803522bd7774da9390e9c4ec170eb20f44531396177c8c1a6d98b1eb4a4594b0423f9d31b6ac1241552e7a
-
Filesize
11KB
MD5188a93297ea106b8b5453e13de6d933e
SHA19ccbb6917d17e45682c7dbf62a78ca6853ce8e01
SHA256fa57a3862ec72a1fa5023ad199d677fbd89f1dd7e30e38ebf5545610a00d51ad
SHA5123a4e439dad28b50c3fba01ef33f95d1f8384a2ba47d04ad775b7435f45580800d6d842fc0d9c66a01975f39f14e7dcd8b2e4e1d5ccd03d7e0343f09af8253e93
-
Filesize
11KB
MD518c3580fc8f83c2e811f56f078062386
SHA1686fe031e715395c8829711aa3086edae224b9bd
SHA256700d06779e9dc2bea918e4f875b80905372aed616af4ee8398d4d9c7c0b25f8b
SHA5125992aa3e30311fcbb649d299af7c32c412b0dd8babd372ec354b90edec057908894e55e99c99ac49d6f09c9975aab0b84cc2743a77a62d12c5f52179a1a251fd
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
29.5MB
MD5a81e806fb3022612824fbb9fbfeea501
SHA1ebf19adbe6a3fec62be7ca4d1fab1a3e52e4d33a
SHA2564cb3b39c88b96ba2b3208f3e360f993ae47dc6a386605bfba87f3db9c087da2d
SHA51234bc0e582457a9db371112c009eff122259ce9c4560c46e146c9a40a4e9f212da721122a704ff0fbebb1d94e38ba5dd0d6ea3cbfd2caf571c5ecf90a6a7b5977
-
Filesize
80B
MD5e9918809775d58624595598e49b57dbd
SHA1d4e170c0fb629d2835e17bfefaefca66628184ca
SHA25604e4b3bd71dac9838240c0ddcc37c69024d06d9780f6180b9617c6272647ebc1
SHA5126ab392981d0806d41d1b991ea97be5b4a218997ef3646ee4528969660baa5bc70365d392640c6bcb9492c0fe5456b062e334c42e6884bf6ab37df372f7f79048
-
Filesize
1.5MB
MD5b761d7400d5136ee0b1a40b5a3228152
SHA1ad859361b2494f2de31a85904a076c7bd3214f5a
SHA2564e06db09b8c3769968c3d0b51d7cf7470fdba1aaf32decf49dbd923708f86ae7
SHA512a7f6919dc30ab2b3bfd2af6e544fcfcbf7bc52aa40c96136b6a3c9707d14d1116a3f7e72bc334d465bc7dab7df8fe824e7fe74937830b3540e4fa38896c5bc10
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
40B
MD5c43ec825c5953172d4e3a9da481c5ca0
SHA107176c2a5632446fca0efd535ed982bb24acd73d
SHA256a96a71e7c933b650b39140229902997590a1ee559dcbca6a3a896d0de172160b
SHA512a2554e43fcb5a3cd74214c9f0c2082a4ae9256ef47752bbc2cad220ba860a8e3aa4839ddf0f70f42adfc8e0eb2b37e330bba5820b2964d8e1ea48c3cd9eccef1
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
389B
MD5a26055e5c61cd6bc52903354d2ee117c
SHA152bfd44d1f4cb1055e5ef1b6cd8e64c40ae0f6cd
SHA256b0828eb28bba30f76d09f64085754877138944ba0eb80647a8b390087578f61a
SHA512d400dd0ca21e0ec083be1bd023470a1425889d70e29235b3fe7b0dd393b5b6b0cf8d26802d9f5a53bd5c3a8cb4d97a6aced98e941496961003fa6eadfc28750b
-
Filesize
625B
MD526ebc9312f2b2a73ffedc123271896f1
SHA127d99d38bae2a79236d017ea39e4caf4119ce64d
SHA25644f9968a76caab0c138feb526bf1a4cb4bf7c227d2167146074d26a21f5aa7fa
SHA5125a6489f2a1be331c0b38bee8756f1e5629b5a5b192dfc43ad323f750e12bf3a13c5f766cbfd44bbbbe20ac6e33c829612da05c31525326749d2b1bcf29dcaa7e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
625B
MD5d5b209dc17e734bbe64526737f4bff17
SHA18cff3b66dcdfc724132038bc5a884ef6d9190c92
SHA25686475db8793fa8d488d11e5fb34930cf0c96a1319ce54b4240d9a165bb8beef6
SHA512b88ff4270ea09b7945cc2970f58d3b563cf07b70844ab0a1bae386665effe2407f6201840e6d926a218eb578fcb6067d34bca657ab0f534de1dd7811c8397aaf
-
Filesize
370B
MD54feb126678ebe429c7c2a50ef0529b20
SHA19731fd61e3eb5442dcd7c5354d9c33ac864a492c
SHA256fc175289ecf3d7bd3f20c5392c9a16a41205063688bd0ec27c52c4ebf6ae2da3
SHA5123829b121a274f8b1ddf606c9d49726106abcf7bc4d1c618a2104c6d09643bda8b83e95a7364803ec45ee3cdeac70bf84c94379c02c30c8dbb35f7ee9c530d9a8
-
Filesize
86B
MD5d11dedf80b85d8d9be3fec6bb292f64b
SHA1aab8783454819cd66ddf7871e887abdba138aef3
SHA2568029940de92ae596278912bbbd6387d65f4e849d3c136287a1233f525d189c67
SHA5126b7ec1ca5189124e0d136f561ca7f12a4653633e2d9452d290e658dfe545acf6600cc9496794757a43f95c91705e9549ef681d4cc9e035738b03a18bdc2e25f0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD50509306de948e1eda2c48087f162a1b4
SHA1ac8ec5aeedde2aee9a0c3c07502d3b0b00550846
SHA256b6086e1120a9c69b2544d89e8418cfaf95e709c6ce5e01b1ed22e093db43b31e
SHA5121fb5699ce7d8de99a3319eeac2cd9f25e4feda86985a6ca52d88fe53750a14a920307aaf0b202feee13c973a7249d95b0a8a578808d726155f2a6d5f2970424d