Analysis

  • max time kernel
    285s
  • max time network
    284s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2024 21:35

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/RAT

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (3249) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • NTFS ADS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/RAT
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd42d46f8,0x7ffbd42d4708,0x7ffbd42d4718
      2⤵
        PID:4896
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:2
        2⤵
          PID:4956
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4280
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:8
          2⤵
            PID:4800
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
            2⤵
              PID:4044
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
              2⤵
                PID:2992
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:8
                2⤵
                  PID:1620
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4504
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5104 /prefetch:8
                  2⤵
                    PID:4808
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1840 /prefetch:1
                    2⤵
                      PID:8
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5340 /prefetch:8
                      2⤵
                        PID:1848
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4912
                      • C:\Users\Admin\Downloads\WinNuke.98.exe
                        "C:\Users\Admin\Downloads\WinNuke.98.exe"
                        2⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:1640
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                        2⤵
                          PID:2224
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3460 /prefetch:8
                          2⤵
                            PID:2716
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3128 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2580
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5664 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3528
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:1
                            2⤵
                              PID:2932
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6352 /prefetch:8
                              2⤵
                                PID:3412
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4640
                              • C:\Users\Admin\Downloads\Mabezat.exe
                                "C:\Users\Admin\Downloads\Mabezat.exe"
                                2⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:4252
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:1
                                2⤵
                                  PID:4572
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3380 /prefetch:8
                                  2⤵
                                    PID:2264
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6324 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5096
                                  • C:\Users\Admin\Downloads\butterflyondesktop.exe
                                    "C:\Users\Admin\Downloads\butterflyondesktop.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:1584
                                    • C:\Users\Admin\AppData\Local\Temp\is-MT31C.tmp\butterflyondesktop.tmp
                                      "C:\Users\Admin\AppData\Local\Temp\is-MT31C.tmp\butterflyondesktop.tmp" /SL5="$C003A,2719719,54272,C:\Users\Admin\Downloads\butterflyondesktop.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • System Location Discovery: System Language Discovery
                                      PID:3476
                                      • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe
                                        "C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"
                                        4⤵
                                        • Chimera
                                        • Executes dropped EXE
                                        • Drops desktop.ini file(s)
                                        • Drops file in Program Files directory
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SendNotifyMessage
                                        PID:2492
                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                          "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"
                                          5⤵
                                          • Modifies Internet Explorer settings
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3412
                                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3412 CREDAT:17410 /prefetch:2
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies Internet Explorer settings
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4640
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://freedesktopsoft.com/butterflyondesktoplike.html
                                        4⤵
                                          PID:1136
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0x11c,0xf8,0x7ffbd42d46f8,0x7ffbd42d4708,0x7ffbd42d4718
                                            5⤵
                                              PID:2936
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1344 /prefetch:1
                                        2⤵
                                          PID:3260
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:1
                                          2⤵
                                            PID:2580
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:1
                                            2⤵
                                              PID:640
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:1
                                              2⤵
                                                PID:3956
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:1
                                                2⤵
                                                  PID:384
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6424 /prefetch:1
                                                  2⤵
                                                    PID:1924
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6912 /prefetch:1
                                                    2⤵
                                                      PID:2716
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:1
                                                      2⤵
                                                        PID:1744
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1344 /prefetch:1
                                                        2⤵
                                                          PID:628
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:1
                                                          2⤵
                                                            PID:4100
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2220 /prefetch:8
                                                            2⤵
                                                              PID:5048
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:8
                                                              2⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:4488
                                                            • C:\Users\Admin\Downloads\HawkEye.exe
                                                              "C:\Users\Admin\Downloads\HawkEye.exe"
                                                              2⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2956
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7144 /prefetch:1
                                                              2⤵
                                                                PID:2932
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6820 /prefetch:1
                                                                2⤵
                                                                  PID:856
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1984,6009295486043558621,7723192665080144361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:8
                                                                  2⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:3332
                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                1⤵
                                                                  PID:3228
                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                  1⤵
                                                                    PID:4100
                                                                  • C:\Windows\System32\rundll32.exe
                                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                    1⤵
                                                                      PID:3760
                                                                    • C:\Users\Admin\Downloads\HawkEye.exe
                                                                      "C:\Users\Admin\Downloads\HawkEye.exe"
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:5004

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe

                                                                      Filesize

                                                                      3.0MB

                                                                      MD5

                                                                      81aab57e0ef37ddff02d0106ced6b91e

                                                                      SHA1

                                                                      6e3895b350ef1545902bd23e7162dfce4c64e029

                                                                      SHA256

                                                                      a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287

                                                                      SHA512

                                                                      a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717

                                                                    • C:\Program Files (x86)\Butterfly on Desktop\license.txt

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      a2ff2d70520af637d58a0269061c9a70

                                                                      SHA1

                                                                      8d5b13d9c6eae5ecc9c7dfd87f2236deb7fa287a

                                                                      SHA256

                                                                      08e6d999ce775f04b33e73efaa0973de2b6ebd1d576131b00cfb8be86ebf71b8

                                                                      SHA512

                                                                      7470147fb4bc821acd2f7711d6075c60a68f466d90a2f70c6304b250baefa7250835837749b1c442a2575891b63768980bf898ece88edba90d2853b2d56e5b90

                                                                    • C:\Program Files (x86)\Butterfly on Desktop\unins000.dat

                                                                      Filesize

                                                                      4KB

                                                                      MD5

                                                                      606f61cd5ac5272d3b96a99091223e8e

                                                                      SHA1

                                                                      51b7cbc83eca4be3896d48025cec2d4ef2ecef66

                                                                      SHA256

                                                                      12ad9b7172f5a1e2fd0e823a6d7e9fdec1e1e377f1ee651f121adfffabade0fa

                                                                      SHA512

                                                                      6870fb20d6ff7814cd87e2921d04d8fb813d38c0534ad846cf3b979e75f7522bfdb984890e40db47d92a86235b33b26f45604bcd7c37be7c1631a91b1ff5c758

                                                                    • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                                                      Filesize

                                                                      4KB

                                                                      MD5

                                                                      0c39513ed2e1c9a1b3b2a4003b71dcf1

                                                                      SHA1

                                                                      e7b3be569a1e57f7aebffa42bacf4ef25dc446dc

                                                                      SHA256

                                                                      a6c6cc92a9a431f42b5ceb728d726cbb4614c883e1b79ce06d57dd13c311b99b

                                                                      SHA512

                                                                      3c6438a871862870ef8c6d0f12ea390e74412c2d366e3b7d0d8ca7828954c17343733fae3528fd6cee6cabbea490d8892a10c24c53c55b428c95d837928cc502

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\HawkEye.exe.log

                                                                      Filesize

                                                                      20B

                                                                      MD5

                                                                      b3ac9d09e3a47d5fd00c37e075a70ecb

                                                                      SHA1

                                                                      ad14e6d0e07b00bd10d77a06d68841b20675680b

                                                                      SHA256

                                                                      7a23c6e7ccd8811ecdf038d3a89d5c7d68ed37324bae2d4954125d9128fa9432

                                                                      SHA512

                                                                      09b609ee1061205aa45b3c954efc6c1a03c8fd6b3011ff88cf2c060e19b1d7fd51ee0cb9d02a39310125f3a66aa0146261bdee3d804f472034df711bc942e316

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      ab8ce148cb7d44f709fb1c460d03e1b0

                                                                      SHA1

                                                                      44d15744015155f3e74580c93317e12d2cc0f859

                                                                      SHA256

                                                                      014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff

                                                                      SHA512

                                                                      f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      38f59a47b777f2fc52088e96ffb2baaf

                                                                      SHA1

                                                                      267224482588b41a96d813f6d9e9d924867062db

                                                                      SHA256

                                                                      13569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b

                                                                      SHA512

                                                                      4657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      6dae005591264495d0d3a9e0bce7d4e2

                                                                      SHA1

                                                                      c55f18800d9736c23c2467fe1f7a03834add6e4b

                                                                      SHA256

                                                                      29464df5fbba26c5a50d6c6a64603c77588bd976c9a3df64c02c0ec08d513f8a

                                                                      SHA512

                                                                      243edb71e7a105914ff4535c81d22a2f5e3cabb34fcb832d99e3a161db7ac6993b27bfbac3d17a74c0ba8c5f639f9e0a9fb49f95af9a18f4bee8692e206afd36

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      88906bf3d8396a436798fa3d94065dc5

                                                                      SHA1

                                                                      80035fe36290cb735bdf1293b4c04e3e8f23099f

                                                                      SHA256

                                                                      bf81702a52abaa067164b73ba94850c146be507cccf4f8e82434ecc2f3646cb0

                                                                      SHA512

                                                                      9282876aded1d143058fdeaae3293e6265409f7eaa3cd574fb7ca07b91f1ef420951b501e1a958982dcaa63c509ca109553be424f7c17a2e32c71b38405efe34

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      a0a6bea0b10cad0f4561c3f74a0003f7

                                                                      SHA1

                                                                      2785422a5df8afd606f7df7403cd7503bd490010

                                                                      SHA256

                                                                      738657bb82e0a95feba66f98dfa45698161e3e3ec4448c3be251a0858bddd808

                                                                      SHA512

                                                                      fc45cc5cb9af01046ab4d95e9a84d7a4023ebdde5541fdb3ac8fb998d6df31a42866bba5a6336ab3a816cbb86cddec3545a73a36bbdc3279f63e5b00f878b2d6

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      831fe661cf7cb82e1826b7314385dd9e

                                                                      SHA1

                                                                      44d78d5da1f45adfddf63bcadfb7a38d45625f0a

                                                                      SHA256

                                                                      e0de0f6a59f3bb470abe8377702bf2be1f00b31505a8b25302e2d4a15f1a4303

                                                                      SHA512

                                                                      87c6e81930e242b2eda105b9a4c38fbc661c2b45e2996d32efa0cc1812898fdb0d5f5bc835a156174da20912fd6cb2a8c6b8ec7afc901e6e6c0f4442a85be6a9

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                      Filesize

                                                                      579B

                                                                      MD5

                                                                      75237b876e4ebf0cf587313ae92b7952

                                                                      SHA1

                                                                      ef712d6b1e678d091b39cd593b8d4a2a5520f139

                                                                      SHA256

                                                                      d7abd571a35eaba20a7c57d7ac93cbb59b8d4b417f4b67590ee1c29ff561442b

                                                                      SHA512

                                                                      0c96b1f590a69141018c2112e36de65fb30ab57320b4b76da3a672b23c716197fc06e0f381491975319a8ad4ae138660469d3149cfbb69be96a2cfdfcaf802b1

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                      Filesize

                                                                      496B

                                                                      MD5

                                                                      0e557fd09056f9df49a20a929d205c8b

                                                                      SHA1

                                                                      edc669a2aac84bf172c284ef7cb3d60415b3570b

                                                                      SHA256

                                                                      71054cb01206f902efc24f30cb2c8b033d10fd228a8b51f67545273a64819901

                                                                      SHA512

                                                                      9a8a96abe70574a762726af8d9b834bad6c8258bd40feff65ea9e8178f6f9d580fd4bd899b81c63e86468f8629d2af203e7dccabc72e08efb6d1a718dacbc07e

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      8a228ed8f29280cb445fd76e9b4805ec

                                                                      SHA1

                                                                      84f8f3b39703105a1276c3150d4d023dee1b0558

                                                                      SHA256

                                                                      eaf05e5fb8dc0ec58cad6bdd233e08e997eb99797eec4d73112108e6769ba8c1

                                                                      SHA512

                                                                      94d5c97911d1694afae8387461f76546004649d2373e6ed48fa1ecf1597017f08e9672f5be1c4fe302d823192c1718de285a2546ea4ed7576dbe23d58cf377bb

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      b07d3c2524d5f73afbf3b0a3d74e4faf

                                                                      SHA1

                                                                      86e212dd8ba37e202d1186b633ffbfa945937423

                                                                      SHA256

                                                                      19fc9304352b151797af14e451b785c853957c881f94bec16f1a0429c094142d

                                                                      SHA512

                                                                      50baef360ecaaed0a85a215644529e43fe8cfa9ab1fd24a9c7256f69bbe764eac016072dac5c13ba288af935d409259b8dd7a575e6aebd5f3fceb2dc573d7fd4

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      3d49eccbe74cf729dfcceb691775a70e

                                                                      SHA1

                                                                      4bf1021ffa6d17d5101ad23f555bdf73474c8221

                                                                      SHA256

                                                                      4301413f2e1c38de80135f53cfe961977307e13cc15a3ffe2d5135609dd6b2d6

                                                                      SHA512

                                                                      bd9e173867b4ac63ee5fbc0d710974c03592edb9d5880e173b5ecf6a495190b1077c57d79ada5d69ff26319945772176cd062700a33ebc49b49550c7b123ec10

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      17b26d151cb78c32f32ae8b4a6eddad0

                                                                      SHA1

                                                                      799a9bbf0796bb461417afc2109c9ff910d2b320

                                                                      SHA256

                                                                      33e51cb93a555d10466b0265729de60e1ba8619e64f48c439d5c77e6a5531ad0

                                                                      SHA512

                                                                      71ab2b5029688c254ec024230927df6648ca72c0aa0507c5af5f9939c3399bdea299bba3ab97c302c192cf837e4788163ae51f3f101ae666c21bb371b3aa6f53

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      025c9b4f55ef133242bdeae665bf4840

                                                                      SHA1

                                                                      9655b9f192afc0fc5e822e7b9c88106387ffc616

                                                                      SHA256

                                                                      9895e49524f71c4f8e6dae403ae62c7795decb5b2500d6d915183330251184c4

                                                                      SHA512

                                                                      46fc181827221f88394ee6b3bfd476a48f33305874d40d8b758eaeebcef9c1b3c3be6b6643ff70e3f55c83b09bfaed1e3a249a94916fdc5faa98d482eb43b79f

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      0abb7d533d3bbaca61de16f242b10a30

                                                                      SHA1

                                                                      140d222c3d2f1d6dadacbd8fadd83845b1c12c82

                                                                      SHA256

                                                                      51a1306001347bbf36dce0b0ac7b51962d2c1df9cf2f8fc067b785302e38698c

                                                                      SHA512

                                                                      2f4ff129615b9780262d35b9000f637f9cb574bb44afbde8e39efb330b0aa44ccbf099169431254866c5c6c94bf7aee0a7c09b2bdc87643968dbd5205e26912e

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      28424568b298c6a18083268abff773c4

                                                                      SHA1

                                                                      37f6767d306c0083dc1b836cd5b2701aae1fd18a

                                                                      SHA256

                                                                      77299244a09bd7a55ba8526852297f11dbafa1a35ac077e6545bb629b2582158

                                                                      SHA512

                                                                      b762924b9e96a9279ac5eec6ac088e1c786f62cf7ffd0e3ac438f87055b0d41fcd115f6318b1be4dd3f8daa6ffdfc184ad066aee6e738c67d6996094841c9ad5

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      874B

                                                                      MD5

                                                                      89b678dcdbcdb72ffc39a4495f742bda

                                                                      SHA1

                                                                      5a7f38a18333bf8ce29564948d22fd104b6b0320

                                                                      SHA256

                                                                      81a32ec505d2b49a7f4b06e364d32834884c35a42d7a7653d476c01a6b410eb5

                                                                      SHA512

                                                                      b5f2cc8c4c4b41a7ad832a30d9022a26791b2310811c53ef2cbd9c97ee9527913134711e3b3385117aa12032ac89fcbeb5835386539c4fa49bffca12f3eac871

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      13c18e23096b9a2b4ac5163edb456815

                                                                      SHA1

                                                                      d7c550c1f627f13b38d9a337838e1cfba4f6f5e5

                                                                      SHA256

                                                                      f741b8dd30ef30868a5ef569ebd878bcb2e4d44eb871902c46eec63b8f021d24

                                                                      SHA512

                                                                      ee93cd934b83f4c049f6ce49e327f5701e88455357c252d0f0d58fb72facb1f47ae34865aa7251b2ddb4bdea2df9d6850b3c81936c7e0475ecbd97a4f85b94a0

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      ae8999fb5f80ad7a44d72f32dd914376

                                                                      SHA1

                                                                      aaecaa2ca3d40d756f3ed02640cf56c6025e2b75

                                                                      SHA256

                                                                      7f16e8373f0dcbf1accacb17234b66f92e8392888f8a398a0238225144b546e5

                                                                      SHA512

                                                                      479a99d1ef68a9bd0034faa217127dd6dada012c5091d0b61ec0eb27d1f46bac2459ad942effd79820342dbb49cd60e99e2b0d3e4a66103f53a2c5e151f9364b

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      775b03332cd977a0aafdcf3ec8bfb2a4

                                                                      SHA1

                                                                      e6df0473d9936042b5b01e5587517bf9baae0a00

                                                                      SHA256

                                                                      7206c9f21311012e9fc509c1851ce99ca2c52a400d1a8669b81f151d9ddf1255

                                                                      SHA512

                                                                      3299de277b124e0218d7ec4ec7e2e651ab5c9a7bcf033fef79ac8ebb0f88f16a0460b6bd0ee50b40917d0fa6ecebd5c759eb61e5c1b70058420eea41cdf2b7c4

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      1ce5335508aff53688aea85e3600c379

                                                                      SHA1

                                                                      0d42fc93f88ae520a5a436f02b033babbdff5a24

                                                                      SHA256

                                                                      e50e858d5cb97f1ea2b8cdc112477e400fb85a870deb0bd29351183e159195f7

                                                                      SHA512

                                                                      aeb35823efab680f9f6982fe0215ab6689fa6bc1093567999f35a61fd1e564656d23d11b69e972cf571831fc20b70c872dfbf70e487ef287bb69d6ae7a58491f

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      46ce804fcd90682a3f32c30995bf7ec2

                                                                      SHA1

                                                                      cbe8f8cac73066838bc881fe9cb19e72a1cff555

                                                                      SHA256

                                                                      6e9626644a89323ff3a8ca38e18bd319393e829b7a8c98c92b2d0a01194af7c9

                                                                      SHA512

                                                                      a1096554231e7ff56b056afff7ba1bcbcac0822e4039842de1685d2f933e663a0521d05fb0f54a9d547e11cbdf4704122d24e26f73fe20a8164942a4736d8069

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      6f5f0a1cba4b9b44f19042cef86004d4

                                                                      SHA1

                                                                      7f7237bd9cfe8db01f0697af7b74da9159657a06

                                                                      SHA256

                                                                      dd5cf92195640588f636bd0e0e459375e2beab071817fe184cf94f24b0fc7d90

                                                                      SHA512

                                                                      cbdbe2476f8fecf91a3399955e42f762138344fd700710f53ad90dfc6b38a3c1b89827c8681a2c405271eb82509795fc263837793060aa65fa752e51c34c44e3

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      dc5df178b8bc64ec32e5a6b799b92663

                                                                      SHA1

                                                                      676f446137ae32e9a63567fd8b8c82dad0fede17

                                                                      SHA256

                                                                      f6738a2edd0caa0061ffa7bdfb6b94f700d6dda7e98d1c5a659b410d63af7ca9

                                                                      SHA512

                                                                      f885965307b521a9ff2547c3c31999fd2e75473f6e28bc32bf7e80926cd5b09c412ccb7c530050c3f5b928a59b12503162eff414f0233fb06c16a7051057be6d

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      874B

                                                                      MD5

                                                                      1cb3a544d3e64b3429ba70f250abc3df

                                                                      SHA1

                                                                      01cec25ac7389cce2c6a6db11a017b4b87c449b8

                                                                      SHA256

                                                                      2a63fac17c6e25167ea16b1495d29c5eadb62fe1e80e0f9e89c20f9ce66f0bfb

                                                                      SHA512

                                                                      3e9ba7612541d058697355153ad11699fdfcede277895fbe12e35148c3e8d11ade15d1914d6bc82237f212df24de937485e4c2047a31c5b84ffbfcc1da0c2c03

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe580ec0.TMP

                                                                      Filesize

                                                                      371B

                                                                      MD5

                                                                      0006928779f280098af8e561033d3fec

                                                                      SHA1

                                                                      6a6982bb6c00c379ed501d9ad36a1b61318811ea

                                                                      SHA256

                                                                      4be5e4739cd130809d48d420b2504cf725985e56f83d13f4ec4268cb612effb7

                                                                      SHA512

                                                                      15cb7bb17722945e576a3b44bbcceb7cce190abb0a933b0a60932bdd10bdf921e05c6fc58d7687f4fa44c6ed3dcb2fe97d63c6044891b53958278dc0c63892bd

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                      Filesize

                                                                      16B

                                                                      MD5

                                                                      6752a1d65b201c13b62ea44016eb221f

                                                                      SHA1

                                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                      SHA256

                                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                      SHA512

                                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      1270a14cfde0dcef370f3c941f89adb9

                                                                      SHA1

                                                                      6e0c50d88e3b6debb6c8eb1712ca78d51e91d396

                                                                      SHA256

                                                                      fa6670e85cca14e3f8f6e063d013bae6e83d2f229390ca44b5d11e45d39b543e

                                                                      SHA512

                                                                      6c8ba9bdd15f0038e594d31d957f8371e53421f1263f9eaec7d00125f79f36a6775b47a399a97e9d194f36e02c98078ef6cf4c756f7540e59a2f4811d1407acb

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      231b9e961494d6695b99b9bf8360b61a

                                                                      SHA1

                                                                      5540fe358c575c78517dad4bb48060289b6a9512

                                                                      SHA256

                                                                      43d75587739f10bc06879e762aac4e395df8fe866bbf0ec42d91f9913a9d62ee

                                                                      SHA512

                                                                      f53989956cd3f4c45369be86e5036f66b6e5c3ceda064dae6784041506f4abf6b5afa455aaa7c4f6987358a3ad42a00ae8790fad480675aec5de8a8346d7f803

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      9b5bd515cf9c6a2ab2eb0f54eb2ff34c

                                                                      SHA1

                                                                      4f7f7c585241b5f91f0d053c7227087142e79ff6

                                                                      SHA256

                                                                      fc47d29bc016bbf35edd7380c3626fda251418ef47b25d853572448e6a460a81

                                                                      SHA512

                                                                      ce116d69ab0aa9e614cd98ded4125c16e369d6c7f5151ccfdeb885b2e2671edfab0c785a59cbff9e3203efd5f510e19306e4891adc39988aee35116cda0ee372

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      9b49b18c822ea09c07f62a500f439890

                                                                      SHA1

                                                                      31a97cce5e8aed62012f836d405623ba22f6e0f3

                                                                      SHA256

                                                                      d84f86d9b952f0d41f4ceab2bac97d1924500b4a93b837a12f8ddb196cfffb81

                                                                      SHA512

                                                                      05ec86312d3567461c5d54060e54729816a699fcd3224c2aac1d02041719ab4408e207504f90b208a5ad588b6870f61d77590b6ab171c80a6737e4f914cc170c

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      5abc61ce3d2e560ff09fb7ec8fe9906c

                                                                      SHA1

                                                                      a40800dbb4170c434a999483663789577df8a34a

                                                                      SHA256

                                                                      15294ea1fedcfed18c8a120ee93b54bf2a863cf57c4dcbffb05473097a1a80a4

                                                                      SHA512

                                                                      21704859a25a81ed341884383d7e4601c81daccf75b8eb736931559804efdd334584fc73d5c22e9d43ebe013946051301009ce40cbcb776288a86cb31f01e4e7

                                                                    • C:\Users\Admin\AppData\Local\Temp\is-MT31C.tmp\butterflyondesktop.tmp

                                                                      Filesize

                                                                      688KB

                                                                      MD5

                                                                      c765336f0dcf4efdcc2101eed67cd30c

                                                                      SHA1

                                                                      fa0279f59738c5aa3b6b20106e109ccd77f895a7

                                                                      SHA256

                                                                      c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

                                                                      SHA512

                                                                      06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

                                                                    • C:\Users\Admin\Downloads\Unconfirmed 369707.crdownload

                                                                      Filesize

                                                                      232KB

                                                                      MD5

                                                                      60fabd1a2509b59831876d5e2aa71a6b

                                                                      SHA1

                                                                      8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                                                      SHA256

                                                                      1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                                                      SHA512

                                                                      3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                                                    • C:\Users\Admin\Downloads\Unconfirmed 369707.crdownload:SmartScreen

                                                                      Filesize

                                                                      7B

                                                                      MD5

                                                                      4047530ecbc0170039e76fe1657bdb01

                                                                      SHA1

                                                                      32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                                                      SHA256

                                                                      82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                                                      SHA512

                                                                      8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                                                    • C:\Users\Admin\Downloads\Unconfirmed 423901.crdownload

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      a56d479405b23976f162f3a4a74e48aa

                                                                      SHA1

                                                                      f4f433b3f56315e1d469148bdfd835469526262f

                                                                      SHA256

                                                                      17d81134a5957fb758b9d69a90b033477a991c8b0f107d9864dc790ca37e6a23

                                                                      SHA512

                                                                      f5594cde50ca5235f7759c9350d4054d7a61b5e61a197dffc04eb8cdef368572e99d212dd406ad296484b5f0f880bdc5ec9e155781101d15083c1564738a900a

                                                                    • C:\Users\Admin\Downloads\Unconfirmed 479221.crdownload

                                                                      Filesize

                                                                      2.8MB

                                                                      MD5

                                                                      1535aa21451192109b86be9bcc7c4345

                                                                      SHA1

                                                                      1af211c686c4d4bf0239ed6620358a19691cf88c

                                                                      SHA256

                                                                      4641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6

                                                                      SHA512

                                                                      1762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da

                                                                    • C:\Users\Admin\Downloads\Unconfirmed 862137.crdownload

                                                                      Filesize

                                                                      32KB

                                                                      MD5

                                                                      eb9324121994e5e41f1738b5af8944b1

                                                                      SHA1

                                                                      aa63c521b64602fa9c3a73dadd412fdaf181b690

                                                                      SHA256

                                                                      2f1f93ede80502d153e301baf9b7f68e7c7a9344cfa90cfae396aac17e81ce5a

                                                                      SHA512

                                                                      7f7a702ddec8d94cb2177b4736d94ec53e575be3dd2d610410cb3154ba9ad2936c98e0e72ed7ab5ebbcbe0329be0d9b20a3bcd84670a6d1c8d7e0a9a3056edd2

                                                                    • C:\Users\Admin\Downloads\Unconfirmed 890678.crdownload

                                                                      Filesize

                                                                      141KB

                                                                      MD5

                                                                      de8d08a3018dfe8fd04ed525d30bb612

                                                                      SHA1

                                                                      a65d97c20e777d04fb4f3c465b82e8c456edba24

                                                                      SHA256

                                                                      2ae0c4a5f1fedf964e2f8a486bf0ee5d1816aac30c889458a9ac113d13b50ceb

                                                                      SHA512

                                                                      cc4bbf71024732addda3a30a511ce33ce41cbed2d507dfc7391e8367ddf9a5c4906a57bf8310e3f6535646f6d365835c7e49b95584d1114faf2738dcb1eb451a

                                                                    • memory/1584-552-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                      Filesize

                                                                      80KB

                                                                    • memory/1584-591-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                      Filesize

                                                                      80KB

                                                                    • memory/1584-524-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                      Filesize

                                                                      80KB

                                                                    • memory/2492-749-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-8708-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-802-0x0000000002D00000-0x0000000002D1A000-memory.dmp

                                                                      Filesize

                                                                      104KB

                                                                    • memory/2492-798-0x0000000002BA0000-0x0000000002BB6000-memory.dmp

                                                                      Filesize

                                                                      88KB

                                                                    • memory/2492-1057-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-8739-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-1496-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-8738-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-8737-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-4136-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-8728-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-8727-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-8638-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2492-800-0x0000000002D00000-0x0000000002D1A000-memory.dmp

                                                                      Filesize

                                                                      104KB

                                                                    • memory/2492-718-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/2956-794-0x0000000010000000-0x0000000010010000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/3476-589-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                                      Filesize

                                                                      752KB

                                                                    • memory/3476-553-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                                      Filesize

                                                                      752KB

                                                                    • memory/4252-458-0x0000000001000000-0x0000000001026000-memory.dmp

                                                                      Filesize

                                                                      152KB

                                                                    • memory/4252-460-0x0000000001000000-0x0000000001026000-memory.dmp

                                                                      Filesize

                                                                      152KB