Resubmissions
02/08/2024, 22:55
240802-2v6b1aydja 602/08/2024, 22:32
240802-2gdd3atark 602/08/2024, 22:31
240802-2fdcnsxgqb 602/08/2024, 22:20
240802-19jacaxerf 602/08/2024, 22:13
240802-15fzessfml 6Analysis
-
max time kernel
228s -
max time network
230s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 22:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://github.com
Resource
win10v2004-20240802-en
Errors
General
-
Target
http://github.com
Malware Config
Signatures
-
pid Process 3912 certutil.exe 3732 certutil.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 45 raw.githubusercontent.com 46 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "182" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe10000000b98ea471d7e4da01c57a31ade0e4da019c68ba4c2fe5da0114000000 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616193" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 010000000200000000000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1194130065-3471212556-1656947724-1000\{86BBAF24-215C-4C6A-8431-9D07404E52C7} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616193" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "3" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 168625.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 353909.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1844 msedge.exe 1844 msedge.exe 4816 msedge.exe 4816 msedge.exe 1996 identity_helper.exe 1996 identity_helper.exe 1768 msedge.exe 1768 msedge.exe 4168 msedge.exe 4168 msedge.exe 3212 msedge.exe 3212 msedge.exe 3552 msedge.exe 3552 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4372 shutdown.exe Token: SeRemoteShutdownPrivilege 4372 shutdown.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3552 msedge.exe 1920 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 2232 4816 msedge.exe 82 PID 4816 wrote to memory of 2232 4816 msedge.exe 82 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1204 4816 msedge.exe 84 PID 4816 wrote to memory of 1844 4816 msedge.exe 85 PID 4816 wrote to memory of 1844 4816 msedge.exe 85 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 PID 4816 wrote to memory of 3596 4816 msedge.exe 86 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 4952 attrib.exe 4336 attrib.exe 2184 attrib.exe 3136 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://github.com1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bbaf46f8,0x7ff8bbaf4708,0x7ff8bbaf47182⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4044 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2748 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1260 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6988 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6908 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7092 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6976 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,7295789238108455487,12926194137653940437,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1924
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\dw.2.bat" C:\Users\Admin\Downloads\dw.bat"1⤵PID:752
-
C:\Windows\system32\certutil.execertutil.exe -f -decode "temp.~b64" "dw___.bat"2⤵
- Deobfuscate/Decode Files or Information
PID:3912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\dw.2.bat" C:\Users\Admin\Downloads\dw.bat"1⤵PID:2776
-
C:\Windows\system32\certutil.execertutil.exe -f -decode "temp.~b64" "dw___.bat"2⤵
- Deobfuscate/Decode Files or Information
PID:3732
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\dw___.bat"1⤵PID:2992
-
C:\Windows\system32\attrib.exeattrib -r -s -h c:autoexec.bat2⤵
- Views/modifies file attributes
PID:4952
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h c:boot.ini2⤵
- Views/modifies file attributes
PID:4336
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h c:ntldr2⤵
- Views/modifies file attributes
PID:2184
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h c:windowswin.ini2⤵
- Views/modifies file attributes
PID:3136
-
-
C:\Windows\system32\msg.exemsg * Why have you done this?2⤵PID:3032
-
-
C:\Windows\system32\shutdown.exeshutdown -s -t 7 -c "Virus Detected, Shutting Down."2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3979855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2ea615fc-a01f-4457-8eb3-c86d1fcb3e09.tmp
Filesize2KB
MD58670f64bbe8f4783dde02e233a84fc64
SHA1bc89c2c3b31672298bfd63553eba0e5324451360
SHA2563a7169dea4a48a47262095e35b5d4b64cb8e647290ca667bfdf4bc02e7b9664a
SHA5127dbd9b35d7edfc9a74740fe889cd1e0bba3b0e7ac123765851342d229131a7e9a038553f67f8e8ff8cb2f9d2d7c8c1045a393e325bc29d2bc644a33f2d61e7c9
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD521ad0df5da82f11f95a2172cd90a4f43
SHA1260baf71781ec308c19f52b757dcf4602265aed8
SHA256a83c0b755742b32661d9e307793983cf1a60b0118f0a3c46cf3990c56f50c425
SHA5126d7d442a42ff755029ea2ef9d4da311f97eec1e95ab2788a2dab471a23cf3315161d212c0a5c015d83be4860890289b0a486085f88384f5282dd96e0547be388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD53de0e9283ad51473c468d73b0e443f35
SHA11f34e56b75bc99a27d159ed1db58a784964d8b87
SHA256414f923439b1fadf772a87d00207971683e7a840453385aeb6af3a105997e5f1
SHA51259874ab0c61e7c1ca110ca87e8fd99d02737a0215b81b66a96482ceac95e5ab1a56255681de8f12ee20496067e5bc9d4c7304570b6202fc70e1468d5b2156d2a
-
Filesize
4KB
MD55ad455664595e89bdbca6d519ba4ab2b
SHA1278ecafbc46559a71db3a56f48c9f667043ed220
SHA256c104e6f7694888c84d73b200cbee7103b22dfc63333e0e9a846b597f149b832a
SHA512efb2b26b386e401ef895737f294a55b9713d3d0d6fdcc21a3e9ff4cc775a6ce974c27babd865661e27dfd8e56718e066bfb68d2290bba1f99827a7f7dbd9d94b
-
Filesize
3KB
MD50cc75bdbb49862e2253a270278e8b19a
SHA177b017afb1dded8309641545e76819d92e823066
SHA2562729afd89ef952ddda192c01fb24d928945bb856cedb089b27743b6822ed481a
SHA512c036c152bafec7c111afe2c5c303ced3e9fac37e7ca0d5589c1f6466f863e80c963d6e06158392d2d6014d4ec9a1f8f426b280673ea1882d0ecb61b9abb54648
-
Filesize
579B
MD5ed5f4213c17629776cd75510648fc019
SHA1ebfa685dca9b7c920cd5ad521c03e4ad0ce435b9
SHA256e969795f0e63ec8a35cdf34d5bc43867ca0825bebfed9734943e69b34ed2ad87
SHA51271bcc166ae5a48f7a79aa5de7ecc7e10dce22c39240ca9ffe9d0f9340f40fc2a2429529cfee8b2b5d7082efe94921fa7df3454852d5313ff4093bfdffc189627
-
Filesize
6KB
MD58e9e5789c6aeaa9f638bab936c47a13b
SHA18b14b91762ca660f4ac6a079614ed645ed01aa43
SHA256f04b54fb25c2a006a7d21bbf6fbb5dff2880077faf52085646f15a5346c367f6
SHA51251b53f3dc67ba24252651eb98896fccdba326444d0e57ba7cc45fceefb1cdc431d78ee3229d0e30d9fc331a5b1ee4d139cb503ee7d1ad8c67341e286297ec6d7
-
Filesize
6KB
MD5f62cb644eb717bd86c6a8ae4befa6b9b
SHA13c8b35c725396ae28ebb942c4399fca3afa3294b
SHA2566897f8b2266ec22f3e7bc49fc35bcbbf4b8e8b1e5d202269d99d18fac2f209ea
SHA512113918899ff3ce9dab65f654de85383c306ef331e54bc01da02436b29feb6b7a9c7a27aa6259aa14bd89a30741c075120dbcec4246f19d4e6569a640b3524852
-
Filesize
6KB
MD543b6a21a97a4556c29bce3688f118ada
SHA1b7c578de1cabd9bf49ad7b0671daf9bdc234f01d
SHA256a5c3150ecf6941581329c3640552ab4534770fd9b4938082ca288b50c68edffe
SHA512dea7cb5cc25028bde921188e6dcb2c932d76c3f2cddd6d211750943a0b90af767707c317b809e2c1fafcde130efbcb8ff9d126b797382c6986aa7f3fd0af6a8a
-
Filesize
8KB
MD543fa403dbc1d08a2bfdce1519734c1d9
SHA1833eb2ec70061c09fd1966f2afdbbf0f042baa41
SHA256b0d0b7b4d877d5068b5031d3b6cbc5ef1167bcc73e5be44894e2a58f5af785a5
SHA5122ac588635438a029994ef0ba1a3d3d04f6c46316955810cfb7d32efb7aef4861b785a5aebae1e0bfe01ba67fc4973c5b8cad27a78530c887c959ff9506103b56
-
Filesize
8KB
MD5c237f82097d5a25f80122bfacac70f47
SHA15a4b710629afdb595b745ce47a51811e143491b8
SHA256f945ad6b9019b48516ba642ea15175815a9411d65f809aa0a596358b5f9c7959
SHA512a4d501c2e2dc34f3160af9a461251b6eb4c971a936b1fe90a2c2104c32d77652c0de600771e3e566949cce4dd7e348f78289d74e9a41ec374d129df9e53a39a8
-
Filesize
6KB
MD5db34ed7bfb775470d38ec2a11fb3a840
SHA1a16f9c9e5508b10f4384d8aa5daff2d7901aaed1
SHA256a46723cc7a0156ec48e7c3b48df8ccf718a8e50aa75f690426712e55b9256ece
SHA512acccc571369c385c89aae745a4ac8f7d1773ca4d10a29125390c42126f3d9722597ed587063f15bb4e64956cf258507bf24ac718719a74ba7aa2a5aa2c529622
-
Filesize
6KB
MD5feb30c2c8f6c09eb573262e2ce2ea918
SHA17003d4fd4dc49ab968f57b5434ff7e8961cf964e
SHA2565403e1dd7881490d8ffd52d3d6eb8b72c811d0c2cb26d729efa4ef784eb1a7d1
SHA512b8c7e8e230fa0420157e665549bafe19d3aba3638f248dc4d334af0e3d56d9d4a088c979d1fb9c73cba8795793c1d9bd1fbada36f91727f9e0d02185d9694538
-
Filesize
9KB
MD5a4b19b991c645592a55ec580e681ad2d
SHA14a83a6a4599d9155210ce543efea9033c3b25608
SHA25625231e31f4d3cceb5b35199af2d167422c317b3feabff822da463433f88858bb
SHA512226dc7debc9eb22b7603fb372e15a88a67a2c0c5374729ad1c1888beffab80aae1401fcf92432d5ff087e7c291ded4c6fd24a0211b0cd37e8feaac8e5d2520e0
-
Filesize
1KB
MD541ce18a6eb88e2ff43b94483eb47723f
SHA1a8d63cb5c3857ac2b4023434bf05042efc2e8c12
SHA2560e2bba46aace5c80369abb431b087e2997c3b2bbed43de433d8325c40e7c44cc
SHA51242d15318bdf14d7626e77ccb80ae0917d7598accb8e7c76108b1a2b57f86b88314177604436c275b43173d7f6e755fd62ec697c5a1564f328621965b1223c063
-
Filesize
874B
MD5fe116ad30a0d64521195b740908c4529
SHA1b5978c19391dda1a395989e6ac094170771db5ed
SHA2567ef0cbd52552b023d4d066d0a474c859481b69d0878078b6a668a44d0a5d8954
SHA512dc89c0b207c4600f7f18249776b4108b5f5965b2b3e5184375b7968c4252f769e632d19721c0dee1ba823ce848fdff846d447011af2a813b2a82e856160837cf
-
Filesize
1KB
MD5ca174a8aa60f058fdccf9250a752fe86
SHA18de8e0320afa5d0da7d783c41e7801649f2f50c0
SHA256210f6fc3fb9ba2f1e5dc392ac3480a85c1c06990dba592e41480802aac188f7c
SHA512a0ec1e934a18c50b7e1d589fc3c22f4140cb66536063848efc3aeca738aed5a40c311e48db4c4ac8875e56cecf9f19aeb54bd5e3ef9165d34e5585894439aeeb
-
Filesize
2KB
MD5dcc9ae6c2a8af1b1e2254fd92502b468
SHA1cc1016797a0d4dcebd7a0442a49b9aa5f93e9947
SHA256515e0642635d0b9b973deda308f48e596e13eea94aa0fe58419d5158bb6d0f37
SHA512fd10597657fd45fda5bebae61d4b8b6bb7de5f0f60e31fb1e6ba9a79a73da4f75b75e2da97bab685271304ce1ce7b2bb8cf6abf0b0c4ceda96b0694917eefee4
-
Filesize
706B
MD5ca79703e5a2d3f6c72912b6173f3557c
SHA1592aebfe763fb53745dcad5e0676f9f7bc28d534
SHA2569ca6d8f95f3953f8e6df6ae6d8cab2cd1618aba87594710ed386bf95ab3af18b
SHA51251212c53a494cb14274dd86fed99f7e43a0b0ed70fe9f45931cd6a9ab82094d40c2f619140ee070c7d6e09e86bc9301adf2bc11b1ab68de6717c22e06a20b858
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD538ed3427964f0b53e37323782b88b101
SHA1ad076a434804f3f0f9b9a659683878b13cb4397c
SHA256760029046ea9ddbde2db65db05fc43d23120f00197b71cc6ff3fee6d3ea69c89
SHA5123e57fe0f335fb43c004bf99ec0972467079cdeb031cc535bf3eb643f527a8c908b8bcfc3ea77e072283babe3b36d1acc2fffa540f2420f53edf1e1a74ef9bac5
-
Filesize
11KB
MD5dd4c0cc96ca2bcfb4da2a6964f20320b
SHA119b11812c0da157a3dc35176151aa888769d8464
SHA25606360f0387def2555ad6d284ba0d788b57a8364ccf7cda65a2e4628d9d900f34
SHA512b4b4b36d7564de1cdf7d07ff4873dd39476faebba42ab413d412e6406570dd6880660e37ce56e42911c9d221b98e3f7fe3bb799b84e7fb1c39120a11d40daf11
-
Filesize
11KB
MD553dd8965a62ee059256255456aea2d24
SHA1f5e653cd7c083626b6e1bb703a746d29d5a46844
SHA256365b12c10de103460aa2d5f8108cae1f1a4d18c97ac5a5944ea00f978718f4a4
SHA51274f7235b5a2f36cbf0ae143ace33c88e1cf38ebf8bcd3eefb395d5cc2c312d201b09920f35e5f95c1f984f9f507e8306841ba8ec8077b74fdcacd529d5cde3b4
-
Filesize
28KB
MD54f48d94ebedc320dfec663f75b8969c4
SHA1bc5bd34a9ca30fa10c5b2c32e312547119e414e3
SHA256dd2d6202d1148e8afb4bcecc7e43f540f290fe4ccb39bbd316358f9cc4f2fe84
SHA512c2779c2c8b5f73e416a904e674f4e82ddeecf65972be11f6f5e5818c69535acaa6a3fa3636206c9eabb003a89bac220ee59171422e2a69e56ba2148f93ef80fe
-
Filesize
330B
MD58e12765b70d3c038a48302793cce8329
SHA1a90d4b96b3f250ade21627a401eb66763fac0135
SHA256939cecf539eb89f0d63101e99c5bbdfc4cb6fd2aec13e7799955650ac67e63a2
SHA51231e62054c930bba125c1ddd96b1ae1504e94f93e131ef6d43f0718de1c7479a022c606753b67fc7692dde20703f4ecc121911621f0a626987202f0337c4e826b
-
Filesize
296B
MD52bef33a50313586b83cf8e1faa129688
SHA17863081c9933a44af5d2f1bbba726d5b5be31acb
SHA256233dc6ad74a21661920117903a86d1b9688634de0c80ac75425baf228acb4478
SHA512ee5cd1616f344f93cebc12c6324368d29b3dfd833a11af6999754a910ddd0a9b6fd5b7445395dbf8fd3703bf2d8a5ef363924b10a2f4594d8f3dd259e4fb021e
-
Filesize
8B
MD50d7dbd96fe6d0a5f0efb4f55e8561e8f
SHA1839182cee3df6d5b2c989b4881b37d0a9c42f168
SHA256996a89fd6bfbaeaa1136b801d32ba387187a89862f7f00b1d5a6777da372f4ac
SHA5128fb3900ee7dd9d0196fe446426aa89997e4899ddb74f615b522b75100cd9970c73250126e6a1be83099be9bb1e9402149301ccd8e64bb2987a3a92cbe0f6ee6d
-
Filesize
304B
MD5d76885370e55b8f2520463a847b98bdf
SHA1305199a1d5394ed827cb802038a38aede5843437
SHA2565417b43d7ab307436715cd300087137159d43ddba98e24848c6552febd7e0d48
SHA51236a64e18be55095c17edc8fb873080eb057a7edd869077081590760d8cbe2bbbe5595761b081c90b22b4a413846c249b94ea9390fac82715a3dc7b4b55b43e06
-
Filesize
14B
MD5816cae6f87c10747e73011e19198f2c8
SHA101d9f01b57367c29fc2f9ede2ec625187773cf2c
SHA25682c8bdce355c14c90b32f8f4ad6def0cfd0b648e0e89b1657ce9436268c879a8
SHA5121a56a58c7bfab0f358d079da4135d162417abdadf8a023c55753ab43cd7518136b9b10624f750c8a4b3f94ba41cbd65d348fb4573a441402f653b7e4cc09b537