Analysis
-
max time kernel
178s -
max time network
177s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
28/02/2024, 13:49
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
lumma
https://technologyenterdo.shop/api
https://detectordiscusser.shop/api
https://turkeyunlikelyofw.shop/api
https://associationokeo.shop/api
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4300 GitHubLoader.exe 2720 GitHubLoader.exe 2504 GitHubLoader.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4300 set thread context of 4812 4300 GitHubLoader.exe 86 PID 2720 set thread context of 1188 2720 GitHubLoader.exe 89 PID 2504 set thread context of 4608 2504 GitHubLoader.exe 96 -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable\System\{9190D3B3-6EE5-4DAA-84D5-53D51C8105 browser_broker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable\System\{9190D3B3-6EE5-4DAA-84D5-53D51C8105 = 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 browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames\en-US = "en-US.1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$Discuz! MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable\System browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\NextBrowserDataLogTime = 3055b5637f6ada01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = c1ff62fe4c6ada01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\NextUpdateDate = "415962747" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable\System\{9190D3B3-6EE5-4DAA-84D5-53D51C8105 = 8ed08d074d6ada01 browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable\System\{9190D3B3-6EE5-4DAA-84D5-53D51C8105 = "\\\\?\\Volume{ADD3A5B1-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\\TempState\\Downloads\\Project.rar" browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\NextPromptBuild = "15063" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe -
NTFS ADS 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project.rar.7pu13sz.partial:Zone.Identifier browser_broker.exe File created C:\Users\Admin\AppData\Local\Temp\7zO4E21BA68\GitHubLoader.exe:Zone.Identifier 7zFM.exe File created C:\Users\Admin\AppData\Local\Temp\7zO4E28C4B8\GitHubLoader.exe:Zone.Identifier 7zFM.exe File created C:\Users\Admin\AppData\Local\Temp\7zO4527AEB9\GitHubLoader.exe:Zone.Identifier 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4836 7zFM.exe 4836 7zFM.exe 4836 7zFM.exe 4836 7zFM.exe 4836 7zFM.exe 4836 7zFM.exe 4836 7zFM.exe 4836 7zFM.exe 596 7zFM.exe 596 7zFM.exe 596 7zFM.exe 596 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 4836 7zFM.exe 4352 7zG.exe 596 7zFM.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1988 MicrosoftEdgeCP.exe 1988 MicrosoftEdgeCP.exe 1988 MicrosoftEdgeCP.exe 1988 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 880 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 880 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 880 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 880 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4808 MicrosoftEdge.exe Token: SeDebugPrivilege 4808 MicrosoftEdge.exe Token: SeRestorePrivilege 920 7zFM.exe Token: 35 920 7zFM.exe Token: SeRestorePrivilege 4836 7zFM.exe Token: 35 4836 7zFM.exe Token: SeSecurityPrivilege 4836 7zFM.exe Token: SeSecurityPrivilege 4836 7zFM.exe Token: SeSecurityPrivilege 4836 7zFM.exe Token: SeSecurityPrivilege 4836 7zFM.exe Token: SeRestorePrivilege 1120 7zG.exe Token: 35 1120 7zG.exe Token: SeSecurityPrivilege 1120 7zG.exe Token: SeSecurityPrivilege 1120 7zG.exe Token: SeRestorePrivilege 4352 7zG.exe Token: 35 4352 7zG.exe Token: SeSecurityPrivilege 4352 7zG.exe Token: SeSecurityPrivilege 4352 7zG.exe Token: SeRestorePrivilege 596 7zFM.exe Token: 35 596 7zFM.exe Token: SeSecurityPrivilege 596 7zFM.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 920 7zFM.exe 4836 7zFM.exe 4836 7zFM.exe 4836 7zFM.exe 4836 7zFM.exe 4836 7zFM.exe 1120 7zG.exe 4352 7zG.exe 596 7zFM.exe 596 7zFM.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4808 MicrosoftEdge.exe 1988 MicrosoftEdgeCP.exe 880 MicrosoftEdgeCP.exe 1988 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2396 1988 MicrosoftEdgeCP.exe 78 PID 1988 wrote to memory of 2396 1988 MicrosoftEdgeCP.exe 78 PID 1988 wrote to memory of 2396 1988 MicrosoftEdgeCP.exe 78 PID 1988 wrote to memory of 5084 1988 MicrosoftEdgeCP.exe 79 PID 1988 wrote to memory of 5084 1988 MicrosoftEdgeCP.exe 79 PID 1988 wrote to memory of 5084 1988 MicrosoftEdgeCP.exe 79 PID 4836 wrote to memory of 4300 4836 7zFM.exe 84 PID 4836 wrote to memory of 4300 4836 7zFM.exe 84 PID 4836 wrote to memory of 4300 4836 7zFM.exe 84 PID 4300 wrote to memory of 4812 4300 GitHubLoader.exe 86 PID 4300 wrote to memory of 4812 4300 GitHubLoader.exe 86 PID 4300 wrote to memory of 4812 4300 GitHubLoader.exe 86 PID 4300 wrote to memory of 4812 4300 GitHubLoader.exe 86 PID 4300 wrote to memory of 4812 4300 GitHubLoader.exe 86 PID 4300 wrote to memory of 4812 4300 GitHubLoader.exe 86 PID 4300 wrote to memory of 4812 4300 GitHubLoader.exe 86 PID 4300 wrote to memory of 4812 4300 GitHubLoader.exe 86 PID 4300 wrote to memory of 4812 4300 GitHubLoader.exe 86 PID 4836 wrote to memory of 2720 4836 7zFM.exe 87 PID 4836 wrote to memory of 2720 4836 7zFM.exe 87 PID 4836 wrote to memory of 2720 4836 7zFM.exe 87 PID 2720 wrote to memory of 1188 2720 GitHubLoader.exe 89 PID 2720 wrote to memory of 1188 2720 GitHubLoader.exe 89 PID 2720 wrote to memory of 1188 2720 GitHubLoader.exe 89 PID 2720 wrote to memory of 1188 2720 GitHubLoader.exe 89 PID 2720 wrote to memory of 1188 2720 GitHubLoader.exe 89 PID 2720 wrote to memory of 1188 2720 GitHubLoader.exe 89 PID 2720 wrote to memory of 1188 2720 GitHubLoader.exe 89 PID 2720 wrote to memory of 1188 2720 GitHubLoader.exe 89 PID 2720 wrote to memory of 1188 2720 GitHubLoader.exe 89 PID 596 wrote to memory of 2504 596 7zFM.exe 94 PID 596 wrote to memory of 2504 596 7zFM.exe 94 PID 596 wrote to memory of 2504 596 7zFM.exe 94 PID 2504 wrote to memory of 4608 2504 GitHubLoader.exe 96 PID 2504 wrote to memory of 4608 2504 GitHubLoader.exe 96 PID 2504 wrote to memory of 4608 2504 GitHubLoader.exe 96 PID 2504 wrote to memory of 4608 2504 GitHubLoader.exe 96 PID 2504 wrote to memory of 4608 2504 GitHubLoader.exe 96 PID 2504 wrote to memory of 4608 2504 GitHubLoader.exe 96 PID 2504 wrote to memory of 4608 2504 GitHubLoader.exe 96 PID 2504 wrote to memory of 4608 2504 GitHubLoader.exe 96 PID 2504 wrote to memory of 4608 2504 GitHubLoader.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\LaunchWinApp.exe"C:\Windows\system32\LaunchWinApp.exe" "https://dl.dropboxusercontent.com/scl/fi/hln0vfbugwn340cdy2pbs/Project?rlkey=ir4ytxyhaasm4b3oy5hwhceb1"1⤵PID:3076
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4808
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- NTFS ADS
PID:1196
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:880
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2396
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5084
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:920
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project.rar"1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\7zO4E21BA68\GitHubLoader.exe"C:\Users\Admin\AppData\Local\Temp\7zO4E21BA68\GitHubLoader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO4E28C4B8\GitHubLoader.exe"C:\Users\Admin\AppData\Local\Temp\7zO4E28C4B8\GitHubLoader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1188
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project\" -spe -an -ai#7zMap26899:218:7zEvent306641⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1120
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2588
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project\" -ad -an -ai#7zMap17268:218:7zEvent55681⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4352
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project.rar"1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Local\Temp\7zO4527AEB9\GitHubLoader.exe"C:\Users\Admin\AppData\Local\Temp\7zO4527AEB9\GitHubLoader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137B
MD58a8f1e8a778dff107b41ea564681fe7b
SHA108efcfdc3e33281b2b107d16b739b72af4898041
SHA256d09cdd05da4e3e875d3d5d66c542404519759acda2efa7c00ca69aa3f6234de4
SHA512a372330793e09c661e6bf8b2c293c1af81de77972b8b4ba47055f07be0fcdfe5e507adbc53903a0cd90c392b36fe4a8a41d3fea923ad97fa061dbef65398edf6
-
Filesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5AAKMMFU\Project[1].rar
Filesize210KB
MD5b71fdd1a50f52f8e784f96e620982c91
SHA121b058f33711b201a47ae8276bf3971df9f46ad6
SHA2565e43754c59152d62a7cc0197e5b22302a7a74ba219dfe6d2005e89cabbfb6ff2
SHA5122fcda468e7970566006c83e886de167c28bc22e62e5b829945273f5e9c06b120bbd4c66d92430e3670393aa117f930404e02f905feed952b10634cc8d4e6baa2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\5JERCMPC\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project.rar
Filesize21.6MB
MD5401dcb038dd1807e536a7830ff0b02da
SHA10c1d9e58c303a693ee9ae30e9088f37c1dc3f9ca
SHA25674cf692ff9c1a2d141969b6b368f63dfcb2079ab3fcb401fd854e72b34f6a42e
SHA5121478bb683026615262e28209711bf12467afe8e8b461d0aea818028a05681a8d2e63c6d96a57e854d41536f8c513564fc4d776b0c241c41d94f445b6f26fcdc5
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project.rar.7pu13sz.partial
Filesize128KB
MD5bb7f2fa8cd167c61ab20976db2c2fad8
SHA12a91d95fdf5bc8911a5cc00c47ac1b47c1fa4fc0
SHA256ed1e13704a0ee97224206da5a4c34f2c2807ed1c3aee3bd7e87c31ab13755363
SHA512d8142964a173f04d0da8b9e29b4883844f654b329cb2d1dbd00d37c308161bc760fdbfa251c12a3c553029b3b7aea3dfdd1e87a8528d1be5d7d7a03ba73dd909
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project\GitHubLoadTool\Cached
Filesize2.0MB
MD55c9f05b8288556f0cce8a677bbca611d
SHA14194d8fb763522b0fba94712a61fb99fb15bf7b4
SHA256814886afe51adb37e9e46a1e8e9419ec062f72923d1a8f3337273a53d509d86b
SHA51265df6a784887f3084366df8d65675104e872e8005478f4ba35d2619ea1bb1ee8b04211dee0e01c145d373830b5853bf08aaa80b432cf2b7eeef8070c9f6d7e3e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project\GitHubLoadTool\Microsoft.Windows.SDK.NET.dll
Filesize18.9MB
MD5e3bbbd3dd68e311dab9cec40238654ca
SHA148390edd79e91be8d005f40ddbd15eca722c554a
SHA2567298108b972bd8004bf8326994f3a7f045aed53958c0ca425d3b38e67d8560ca
SHA512ded56aa0852460edd3c6aad192ad27ad21490f1c9adb8ca45b5db308c25942f432fcd43558d37d17c2be9c3daa4c7c344e99b2ad0205826d602bf6c14d744a73
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project\GitHubLoadTool\PresentationCore.dll
Filesize8.3MB
MD5e85a5ff99fd7a6ae9619138293e1cfea
SHA1d1edceeeb255acffe14ad2c4eb4fe2a0a911dfd0
SHA256a70e09031ef5ee4a2d79659aabe5d1ebef48effe2705a6f97c37c5c46cda9473
SHA512b3380cbb8a400562ca9d9ad1a4ebc0167aa16616652162d0f5a9a7a543c52b97b5bf6687a0f63ee913ce73ac61c5bde1375ca317e11457bdbb681a0bf02d435f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project\GitHubLoadTool\PresentationFramework.dll
Filesize8.0MB
MD56fc02df9f27193015cbd29b4a3325419
SHA156b8a56f5379005cef67368b985f9f81f070cbef
SHA2564377e980711d9cd683c84f6726a25be3befdd997dccfd29d657e2a4bb73ed5ee
SHA512ec3afa69aa28c853410b8423612755b84b3cb663320d3ee2ccc29b229e0a05937bed088068ad30108938482e36971dd6710db9f20c3e6273efad4243bdecce46
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project\GitHubLoadTool\System.Private.CoreLib.dll
Filesize6.3MB
MD54bf29901dacdcf36ae06b409ff0655bc
SHA136ab1a1926d13587026486cf97bd2d2b70cf51bf
SHA256a204e55e27e23e5a06d0801729ed897ede1bd4e2f6c375977ebe7eb37ebcfb04
SHA512d5f468844b35c7aa77bfb87abab708f839a27d77cab850372f5bf39613d268b885ea647f0d7a12cfd10f021363028ecfc7a28d2b943b1c39af3c017372cdf477
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project\GitHubLoadTool\System.Private.Xml.dll
Filesize8.1MB
MD56756087e071532303f7001b6e5970538
SHA1bcdb033ebd460ddb70cc8986def9c5e5dedc2502
SHA256320e661c03bd44c9cbeccefa20dfeccc6c7ceebf06a76510e120d37208d61054
SHA5120eb38ae862bfce0628feea7604475ad7019f2e4f652cfc20b34bb37f1fcead271792a9a5d06eb9f30ab95136ff4557f6a9fa8ecb43910c9d3d2eca3691f5219d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project\GitHubLoadTool\System.Windows.Forms.dll
Filesize12.7MB
MD540ebeba76ec2a39637601eaaada6ef8b
SHA1d5d657039adcd0479f5be94cfa13fcd05209bf61
SHA256d103d2a1a3257c74d3d0871f9fab132471769d42bd45853cc2be0c1f93eb0c07
SHA512c4a2b8521315a9fd7f76e97de717fb59792cc54fbf9a87a5da85099f5b84b239353a2749478249e6d57b9ba349ff913ce9222e9626499be3ad67b69704a172e3
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Project\GitHubLoadTool\grpc_csharp_ext.x64.dll
Filesize12.1MB
MD588dc6caa0d47e61c8263ab01a2ca12a9
SHA184d6b4573f9e0ae8c051280ce903e613cf3d6673
SHA2564133225f8e65114926a1f8dfe5e1382186b4150de393cfb9476d32cf45ee05e6
SHA5121df929fabdeee0c344074f9cafef64382fc3d917e3601c84dfb986675939597eea4a5b426e91adc57a4ca00fbae3274d6b6f1c5c478ca9e2f8322890951b5889
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5AAKMMFU\Project[1].rar
Filesize32KB
MD59c0acb825c325685b71eddef95841901
SHA1eb8b5ebc185f64600a1c19e379b098bc46a3aa59
SHA25694265e022fd233eed16b4b49dbea6b3d2555fe8f8d131c55d086544c9adcbce4
SHA5128117a02d81478efda2ca8b2a65e3af43d917d2247766a718c7cf6d2aa1861af3aab8619e296f2dd396771cf786c2c47d8fefb86a3b23ba170be14945dd8e3987
-
Filesize
432KB
MD59a25ab8bdaa157c47a64fc2b0a1e443a
SHA1c96cc57a7bfeaf3415005965974ad721ffebdbbe
SHA25614123370ea7689a1be3d067a5a53c96c47aaf2573714a08b65a25369a7523517
SHA512010a8f22d17a7b17afc70c9ed12ca9a532108e99d1f3fb0dc59a0339473395aaf87781d83a14aff4bce751d4b2417f1d0edf16b6afe186ff9c325100058fed41
-
Filesize
167B
MD5d944b5740f597350307f6771ee904622
SHA15883113bf1205fc9c8fddfa151b3ae31f48a52cf
SHA2562d04863a6ca1c4419e92ace2647fa38767da2eefd0295da01ef948488520c438
SHA5121b312cd1cac8e22f54c503537b1bad94979a6c7ddb843aedf3fbb6627ddfa7dcbd157e40a78a9323d6cc61679394c290398701ee03fa9151973f6fe2d41ccd9c