Overview
overview
10Static
static
10virus/Fidd...st.exe
windows10-ltsc 2021-x64
10$PLUGINSDI...up.exe
windows10-ltsc 2021-x64
9$PLUGINSDI...em.dll
windows10-ltsc 2021-x64
3Analytics.dll
windows10-ltsc 2021-x64
1Be.Windows...ox.dll
windows10-ltsc 2021-x64
1DotNetZip.dll
windows10-ltsc 2021-x64
1EnableLoopback.exe
windows10-ltsc 2021-x64
7ExecAction.exe
windows10-ltsc 2021-x64
1FSE2.exe
windows10-ltsc 2021-x64
3Fiddler.exe
windows10-ltsc 2021-x64
4ForceCPU.exe
windows10-ltsc 2021-x64
1GA.Analyti...or.dll
windows10-ltsc 2021-x64
1ImportExpo...ts.dll
windows10-ltsc 2021-x64
1ImportExpo...rt.dll
windows10-ltsc 2021-x64
1Inspectors...on.dll
windows10-ltsc 2021-x64
1Inspectors...or.dll
windows10-ltsc 2021-x64
1Inspectors...es.dll
windows10-ltsc 2021-x64
1Inspectors...ax.dll
windows10-ltsc 2021-x64
1Inspectors...rd.dll
windows10-ltsc 2021-x64
1Inspectors...ew.dll
windows10-ltsc 2021-x64
1Newtonsoft.Json.dll
windows10-ltsc 2021-x64
1Plugins/Ne...ws.dll
windows10-ltsc 2021-x64
1ScriptEdit...cs.dll
windows10-ltsc 2021-x64
1ScriptEdit...or.dll
windows10-ltsc 2021-x64
1ScriptEdit...on.dll
windows10-ltsc 2021-x64
1ScriptEdit...or.dll
windows10-ltsc 2021-x64
1ScriptEdit...rs.dll
windows10-ltsc 2021-x64
1ScriptEdit...ax.dll
windows10-ltsc 2021-x64
1Scripts/Fi...on.dll
windows10-ltsc 2021-x64
1Scripts/Fi...on.dll
windows10-ltsc 2021-x64
1$PLUGINSDI...em.dll
windows10-ltsc 2021-x64
3virus/Froz...ED.exe
windows10-ltsc 2021-x64
10Analysis
-
max time kernel
1698s -
max time network
1703s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11-12-2024 18:30
Behavioral task
behavioral1
Sample
virus/FiddlerSetup.5.0.20245.10105-latest.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/FiddlerSetup.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
Analytics.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
Be.Windows.Forms.HexBox.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral6
Sample
DotNetZip.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral7
Sample
EnableLoopback.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral8
Sample
ExecAction.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral9
Sample
FSE2.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral10
Sample
Fiddler.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral11
Sample
ForceCPU.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral12
Sample
GA.Analytics.Monitor.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral13
Sample
ImportExport/BasicFormats.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral14
Sample
ImportExport/VSWebTestExport.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral15
Sample
Inspectors/QWhale.Common.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral16
Sample
Inspectors/QWhale.Editor.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral17
Sample
Inspectors/QWhale.Syntax.Schemes.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral18
Sample
Inspectors/QWhale.Syntax.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral19
Sample
Inspectors/Standard.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral20
Sample
Inspectors/SyntaxView.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral21
Sample
Newtonsoft.Json.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral22
Sample
Plugins/NetworkConnections/Telerik.NetworkConnections.Windows.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral23
Sample
ScriptEditor/Analytics.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral24
Sample
ScriptEditor/GA.Analytics.Monitor.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral25
Sample
ScriptEditor/QWhale.Common.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral26
Sample
ScriptEditor/QWhale.Editor.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral27
Sample
ScriptEditor/QWhale.Syntax.Parsers.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral28
Sample
ScriptEditor/QWhale.Syntax.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral29
Sample
Scripts/FiddlerOrchestra.Addon.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral30
Sample
Scripts/FiddlerOrchestra.Connection.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral32
Sample
virus/FrozenPerm_CRACKED.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
$PLUGINSDIR/FiddlerSetup.exe
-
Size
4.4MB
-
MD5
c2a0eb6f104eacec3f39581451ee208f
-
SHA1
9ae7d02aeb640fbd090dfc01885b98dd5dd0b6cc
-
SHA256
1f926cc353301e547e76c6d2eff23fcbe85495ba0292174cc6344fac26457af8
-
SHA512
8b062e4f0af1dce3a12b5776646fe8c235f30de6772f579da1a6ab2bb559ed69b3bd32af95eee248c48008ddcbd40a7e49eae722a44bc9b49dd13fe38113a3ca
-
SSDEEP
98304:KgxyUnSAaB1eXq8yOkLiGXv72Qomw6pvtFIAwdaRdAM:KoWvePjqHv72Qo96pvtF5wHM
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4680 netsh.exe 4716 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation FiddlerSetup.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 SetupHelper -
Loads dropped DLL 20 IoCs
pid Process 3732 FiddlerSetup.exe 4720 mscorsvw.exe 2108 mscorsvw.exe 2108 mscorsvw.exe 1740 mscorsvw.exe 1808 mscorsvw.exe 4960 mscorsvw.exe 1808 mscorsvw.exe 2912 mscorsvw.exe 568 mscorsvw.exe 4468 mscorsvw.exe 4468 mscorsvw.exe 4468 mscorsvw.exe 3284 mscorsvw.exe 496 mscorsvw.exe 1836 mscorsvw.exe 4104 mscorsvw.exe 3336 mscorsvw.exe 2448 mscorsvw.exe 3336 mscorsvw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\49a2460c-211b-4d77-9952-f59431d78d5e.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241211183603.pma setup.exe -
Drops file in Windows directory 37 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\1008-0\System.Numerics.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\1270-0\System.Data.SqlXml.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\6cc-0\System.Numerics.dll mscorsvw.exe File opened for modification C:\Windows\assembly\temp\S9592RP5E8\System.Data.SqlXml.ni.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\6c172340af3f46e7e45d3cea5ee80a56\System.Data.SqlXml.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Deployment\88b596885c6a2aecfe43892d03c5ba6b\System.Deployment.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\6c172340af3f46e7e45d3cea5ee80a56\System.Data.SqlXml.ni.dll.aux.tmp mscorsvw.exe File opened for modification C:\Windows\assembly\temp\2MJKYDRLSC\System.Deployment.ni.dll mscorsvw.exe File opened for modification C:\Windows\assembly\temp\4HQ2XITXIF\System.Numerics.ni.dll mscorsvw.exe File opened for modification C:\Windows\assembly\temp\MAFS6MIJFY\System.Security.ni.dll.aux mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\1f0-0\System.Security.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Deployment\88b596885c6a2aecfe43892d03c5ba6b\System.Deployment.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\1174-0\System.Web.dll mscorsvw.exe File opened for modification C:\Windows\assembly\temp\9TX1K5SGIV\System.Runtime.Serialization.Formatters.Soap.ni.dll.aux mscorsvw.exe File opened for modification C:\Windows\assembly\temp\QAZRKQAM8L\Microsoft.JScript.ni.dll mscorsvw.exe File opened for modification C:\Windows\assembly\temp\QAZRKQAM8L\Microsoft.JScript.ni.dll.aux mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\cd4-0\EnableLoopback.exe mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\EnableLoopback\a8e9750dcec3b7be6005a908fe2c2d8f\EnableLoopback.ni.exe.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Runt9064068c#\ab300698ff0e6328a779058c8a6abc9a\System.Runtime.Serialization.Formatters.Soap.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\0c073f42cf7c0b89bd4ceb4244060ceb\System.Numerics.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\710-0\System.Deployment.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Runt9064068c#\ab300698ff0e6328a779058c8a6abc9a\System.Runtime.Serialization.Formatters.Soap.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\42c7a19a453afb14fda2fe8479e4d8b2\System.Security.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\42c7a19a453afb14fda2fe8479e4d8b2\System.Security.ni.dll.aux.tmp mscorsvw.exe File opened for modification C:\Windows\assembly\temp\9TX1K5SGIV\System.Runtime.Serialization.Formatters.Soap.ni.dll mscorsvw.exe File opened for modification C:\Windows\assembly\temp\4HQ2XITXIF\System.Numerics.ni.dll.aux mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.JScript\180d439c36f3cf6ec5649e1360f67487\Microsoft.JScript.ni.dll.aux.tmp mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\0c073f42cf7c0b89bd4ceb4244060ceb\System.Numerics.ni.dll.aux.tmp mscorsvw.exe File opened for modification C:\Windows\assembly\temp\MAFS6MIJFY\System.Security.ni.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\72c-0\System.Data.SqlXml.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\b60-0\System.Runtime.Serialization.Formatters.Soap.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Web\debe458f6197408829bf76c18c262527\System.Web.ni.dll.aux.tmp mscorsvw.exe File opened for modification C:\Windows\assembly\temp\2MJKYDRLSC\System.Deployment.ni.dll.aux mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\d08-0\System.Deployment.dll mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\83c-0\System.Security.dll mscorsvw.exe File opened for modification C:\Windows\assembly\temp\S9592RP5E8\System.Data.SqlXml.ni.dll.aux mscorsvw.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\990-0\System.Runtime.Serialization.Formatters.Soap.dll mscorsvw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FiddlerSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetupHelper -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Fiddler.exe = "0" FiddlerSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Fiddler.exe = "9999" FiddlerSetup.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION FiddlerSetup.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2366345620-3342093254-3461191856-1000\{7CEC8DEE-35DF-43E9-A965-73460B969716} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\.saz FiddlerSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\PerceivedType = "compressed" FiddlerSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\Content Type = "application/vnd.telerik-fiddler.SessionArchive" FiddlerSetup.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\Shell\Open &in Viewer\command FiddlerSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\ = "Fiddler Session Archive" FiddlerSetup.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\DefaultIcon FiddlerSetup.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\Shell\Open\command FiddlerSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\Shell\Open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Fiddler\\Fiddler.exe\" -noattach \"%1\"" FiddlerSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\.saz\ = "Fiddler.ArchiveZip" FiddlerSetup.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\Shell FiddlerSetup.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\Shell\Open FiddlerSetup.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip FiddlerSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Fiddler\\SAZ.ico" FiddlerSetup.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\Shell\Open &in Viewer FiddlerSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Fiddler.ArchiveZip\Shell\Open &in Viewer\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Fiddler\\Fiddler.exe\" -viewer \"%1\"" FiddlerSetup.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3732 FiddlerSetup.exe 3732 FiddlerSetup.exe 4560 msedge.exe 4560 msedge.exe 5112 msedge.exe 5112 msedge.exe 3472 msedge.exe 3472 msedge.exe 1812 identity_helper.exe 1812 identity_helper.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4680 3732 FiddlerSetup.exe 77 PID 3732 wrote to memory of 4680 3732 FiddlerSetup.exe 77 PID 3732 wrote to memory of 4680 3732 FiddlerSetup.exe 77 PID 3732 wrote to memory of 4716 3732 FiddlerSetup.exe 79 PID 3732 wrote to memory of 4716 3732 FiddlerSetup.exe 79 PID 3732 wrote to memory of 4716 3732 FiddlerSetup.exe 79 PID 3732 wrote to memory of 2160 3732 FiddlerSetup.exe 81 PID 3732 wrote to memory of 2160 3732 FiddlerSetup.exe 81 PID 3732 wrote to memory of 4356 3732 FiddlerSetup.exe 82 PID 3732 wrote to memory of 4356 3732 FiddlerSetup.exe 82 PID 3732 wrote to memory of 2608 3732 FiddlerSetup.exe 85 PID 3732 wrote to memory of 2608 3732 FiddlerSetup.exe 85 PID 3732 wrote to memory of 2608 3732 FiddlerSetup.exe 85 PID 3732 wrote to memory of 5112 3732 FiddlerSetup.exe 88 PID 3732 wrote to memory of 5112 3732 FiddlerSetup.exe 88 PID 5112 wrote to memory of 2972 5112 msedge.exe 90 PID 5112 wrote to memory of 2972 5112 msedge.exe 90 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4084 5112 msedge.exe 94 PID 5112 wrote to memory of 4560 5112 msedge.exe 95 PID 5112 wrote to memory of 4560 5112 msedge.exe 95 PID 5112 wrote to memory of 4564 5112 msedge.exe 96 PID 5112 wrote to memory of 4564 5112 msedge.exe 96 PID 5112 wrote to memory of 4564 5112 msedge.exe 96 PID 5112 wrote to memory of 4564 5112 msedge.exe 96 PID 5112 wrote to memory of 4564 5112 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\FiddlerSetup.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\FiddlerSetup.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="FiddlerProxy"2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="FiddlerProxy" program="C:\Users\Admin\AppData\Local\Programs\Fiddler\Fiddler.exe" action=allow profile=any dir=in edge=deferuser protocol=tcp description="Permit inbound connections to Fiddler"2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" install "C:\Users\Admin\AppData\Local\Programs\Fiddler\Fiddler.exe"2⤵PID:2160
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 0 -NGENProcess 1e4 -Pipe 1f0 -Comment "NGen Worker Process"3⤵PID:3152
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 0 -NGENProcess 26c -Pipe 288 -Comment "NGen Worker Process"3⤵PID:3304
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 0 -NGENProcess 28c -Pipe 298 -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4720
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 0 -NGENProcess 29c -Pipe 2a8 -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2108
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 0 -NGENProcess 2e0 -Pipe 2d8 -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1740
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 0 -NGENProcess 2dc -Pipe 2d8 -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1808
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 0 -NGENProcess 2a4 -Pipe 2f0 -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
PID:4960
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 0 -NGENProcess 300 -Pipe 2a4 -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2912
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 0 -NGENProcess 304 -Pipe 2b0 -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:568
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 0 -NGENProcess 2e0 -Pipe 308 -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4468
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 0 -NGENProcess 2d4 -Pipe 290 -Comment "NGen Worker Process"3⤵
- Drops file in Windows directory
PID:2864
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 0 -NGENProcess 2a0 -Pipe 2ac -Comment "NGen Worker Process"3⤵
- Drops file in Windows directory
PID:3308
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 0 -NGENProcess 2e4 -Pipe 2e8 -Comment "NGen Worker Process"3⤵
- Drops file in Windows directory
PID:1604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 0 -NGENProcess 29c -Pipe 300 -Comment "NGen Worker Process"3⤵
- Drops file in Windows directory
PID:4828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d4 -InterruptEvent 0 -NGENProcess 314 -Pipe 318 -Comment "NGen Worker Process"3⤵
- Drops file in Windows directory
PID:4452
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 0 -NGENProcess 328 -Pipe 2e0 -Comment "NGen Worker Process"3⤵
- Drops file in Windows directory
PID:4180
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" install "C:\Users\Admin\AppData\Local\Programs\Fiddler\EnableLoopback.exe"2⤵PID:4356
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 0 -NGENProcess 1e4 -Pipe 1f0 -Comment "NGen Worker Process"3⤵PID:4464
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 0 -NGENProcess 28c -Pipe 204 -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3284
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 0 -NGENProcess 298 -Pipe 2a8 -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1836
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2dc -InterruptEvent 0 -NGENProcess 2f8 -Pipe 2ec -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:496
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e8 -InterruptEvent 0 -NGENProcess 2e4 -Pipe 1ec -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4104
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 0 -NGENProcess 2e0 -Pipe 27c -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3336
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 0 -NGENProcess 270 -Pipe 29c -Comment "NGen Worker Process"3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Programs\Fiddler\SetupHelper"C:\Users\Admin\AppData\Local\Programs\Fiddler\SetupHelper" /a "C:\Users\Admin\AppData\Local\Programs\Fiddler"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://fiddler2.com/r/?Fiddler2FirstRun2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x140,0x144,0x148,0x11c,0x14c,0x7ffb867f46f8,0x7ffb867f4708,0x7ffb867f47183⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:23⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:83⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:13⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:13⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:13⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:13⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:13⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6688 /prefetch:83⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6448 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:13⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6968 /prefetch:13⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4048 /prefetch:83⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:564 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x154,0x14c,0x144,0x164,0x148,0x7ff704925460,0x7ff704925470,0x7ff7049254804⤵PID:4624
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4048 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13003411796663737941,14241293535267986874,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5284 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3252
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
-
C:\Windows\system32\usoclient.exe"C:\Windows\system32\usoclient.exe" StartScan1⤵PID:1328
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD577fe0ce7e1f9c9ec2f198ad2536bf753
SHA12a366472f227a24f3c0fba0af544676ea58438d7
SHA256c69ca7653724e1e9e52518de8f4f030813e1431223d5b6ad3270531d8df89f00
SHA512e8d4e17b93fb19364eeeffc5b1016fdbe566a8b8d702005291ff263367840b8ccc76290d8a3ad457d40fb5d1c2204bdaa5acba9374236c77935ebb0fe597a095
-
Filesize
152B
MD50d57a449c855203411a38d5ae80bc24c
SHA1b361032efa556fc4557bbad595ce89c4b0c13dba
SHA256bb59bab10e406cd91bdfe4fc0e8ce2817a6ca32fc731ccb3f90b6b79c1a46c21
SHA5128d4244dc9c0e9518cd71aacaa54d43c1e2d74519e3e692160b2b040d00aac25c4ba7a5705391e50957d46c8c711dc07604effea3bc06c8956ecf717f61008da3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD517eef21cfc0ff8acbc3879b997b13cc3
SHA19ef9dcbc1ae00d8b1c29151bf98c601bbcf0eefa
SHA2563deb7d152524904a2d16e8d693fb79f2699412c3abf7e7d7326a64ffed8dd0fd
SHA512de64ea0f2e3701ce86e2c3fc0a0457069584b7d7e61a3b63e0cb31abecbfc00a81459eda2bf67acd964e79e09b44630c9acfd64d1e1f6e46e7f78c2899b3e7fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize624B
MD56a2af5ebc5f9493843eb5dd57f16ba5b
SHA1e4138f18c5dc07315c60f025edf3965ca0ce04d8
SHA256f54465060a8853ce9ce5fb9cdd614bc62a97d9f936fce5e2aa81487b3157bbe4
SHA51274ab0547df0c6fd987ef7ae6406e3b05e4b09a71d723908660d8f4e643171b181c5226bd3d6d9738451281ca437bd9889ca3584ff719d76134a6f16e1ab852e1
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
2KB
MD53d7a102977703740feec34d9844b0c0e
SHA1e4b6be5a0e06f56f99fdbc7bbb28fe732669b77a
SHA256c231bc59b9e0610b3ddd388db344f3fd37051551188e61cc3703371d175475e4
SHA51285cfc98f947afc12767dbc91f53f62b290e8e636c64a40a621e3ca4ffeafce7ac1b44a23ae98cc0f2d6404d9a56b3ac9f9a97592898e9a4dfdd9ab5d4bbb3139
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe5906bd.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
4KB
MD59a1a3eade319a29a75089d48e2b87e2f
SHA1c711f28e097c3dae6b161fa7d44c88e1596c7c6b
SHA2560b858e2127fccf40a1d7ea2ddec93190a363675e375a74721019c134b4e5d813
SHA5123b6d2c20bae6bdf04532cc6467d2042e1d880cf7981faa3faf1b02d70a2b7c8ad0fd524a0d51c17fcc80c3546f05573a81bb010a389432f9a2f357442ae67184
-
Filesize
6KB
MD5489461997d2ff76acb3383afc2113c09
SHA17a5027db6ac51d08d31ae04cde0c88d7706b3d2c
SHA256c5cc8b89895b2dfbd7a8f50c4a35d7d71d2a244c8155a8abd58f05645e96d0c9
SHA5128f2b83bb070ffec41c7f9d714bdd1ada483d4629b95583b20ba19edfe16039130462c4f9bd2d2ee063e6af103c40da06305c5b5aa95df30f709321df988e9566
-
Filesize
7KB
MD5a2b6666a2973c15701687240b210741b
SHA118b5c7fe1a3195d8b63aa23c60b79ce14afde908
SHA2560e3109d556897620ceb0b42cfdfa28c18d9e7b77f171c146ce74c9929a1a4427
SHA5123ca0b550ca61e3349a1db49521f825deabbf4d88cae2b5983e10ea7e188b4402a0f9cf6c19c6966e684db013f596d04778deb9cbc0ade148a85ff0dbb6b110fb
-
Filesize
24KB
MD577006dacd174a80aa9b867f95d5df337
SHA17078db638c72ee5cf4ede7911e4421cc4ae103c7
SHA2565e22af33da2ed3f3197d9c899a8fec5e2716b54be019c484cd59960da8f143d9
SHA512e8268ed24af38eaebda4cd864e5580ed1bb63e3e4b72a27fe3404baeb7c8c944a7e79282712ac9d0b33f0123654dedb1984633d6ae2a5b412d6536e2b0389bb2
-
Filesize
24KB
MD59b2345e425acf05ffaa1dee20d4fdbe7
SHA1aecf86c5a5d24b77aea68f6bc99e7f42c9048bc3
SHA2561eb6cc0eab0b222c1111dba69db74281366b9f5dc9f8707ff215b09155c58d14
SHA512647fc97d693b709ef3b0877b6de1d4f9f4e1085d35b809d27360ede1be52b37f9a967fb80ce43be35d60b52409c7e4036376d7d931c96f0660a2eeffa58a8208
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5f008fd1c3d0e25ffe229ee2c9ca3a6be
SHA1ffde9694c11adf6afbbae6c83d857f0b426d4847
SHA2561168559bf92fa6c79777d8dd4f1ad60d5707a1f92f73928468cb718ee2fabf47
SHA51211e380727f14b5ae3007b72c2b1daaed198493bdcdf169dd513372ab3f38baac2d4a1034fad994e6dad8ad7db3286fc677e26d225d35766336a9c72d2308b359
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5864fe.TMP
Filesize48B
MD5370c70b93dfdee516695b54f4d3bac21
SHA159c3e8a0d95a1866cad96e3fb8370fb6f9adcd07
SHA2562be76d9dfe856106110737dff9b1b0ef9c073c535339c101e4be5074641bc738
SHA51289620c1fad2f1e27d366137cbbb84bcaec2aa9f5ce77630a61448fc3a688549f8342bca945a40a58c8228456981ebf1d8631dfff5000ac074679dfcc6ce67789
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD518e3701e9005fa5ec5d64f99e997dbcc
SHA13e336b4cc9f0d91c8634ddf0162c8342ad132bd1
SHA2563353713201c56ecbc33b2cb5c3723c980b0b8841cae30e68d97b3d8986509efb
SHA51217876fdc23ca814db30228be4ea330814afde48c2d83fcce956a568c330b1430fbdfbe7920a6dc97c14ed37c794ee62c7071ce10775c175f2a06c84467c0f781
-
Filesize
32KB
MD51c2bd080b0e972a3ee1579895ea17b42
SHA1a09454bc976b4af549a6347618f846d4c93b769b
SHA256166e1a6cf86b254525a03d1510fe76da574f977c012064df39dd6f4af72a4b29
SHA512946e56d543a6d00674d8fa17ecd9589cba3211cfa52c978e0c9dab0fa45cdfc7787245d14308f5692bd99d621c0caca3c546259fcfa725fff9171b144514b6e0
-
Filesize
461KB
MD5a999d7f3807564cc816c16f862a60bbe
SHA11ee724daaf70c6b0083bf589674b6f6d8427544f
SHA2568e9c0362e9bfb3c49af59e1b4d376d3e85b13aed0fbc3f5c0e1ebc99c07345f3
SHA5126f1f73314d86ae324cc7f55d8e6352e90d4a47f0200671f7069daa98592daaceea34cf89b47defbecdda7d3b3e4682de70e80a5275567b82aa81b002958e4414
-
Filesize
82KB
MD581564947d42846910eec2d08310e0d25
SHA1b7a167dcd3afb29c8a0e18c943d634e3fc58a44c
SHA256543f16b73f7d40177585332f433ce76dddc1526e12bcd62cb73edd11eb002341
SHA5128f06409517697b022787bc9e2ed7e73100018422177aa3f63ecb406c3bdb6b021624f909a16fca0430002bfa7d35a461b38750c79c0273a154f63316b4e13037
-
Filesize
3.5MB
MD587bc17f56e744e74408e6ae8bb28b724
SHA13aa572388083ff00a95405d34d1189c99c7ff5be
SHA256ffb24fc36ade87988f9908e848d0333ce7ffb2b4e4d0ffb43f6556246069d057
SHA512cbeee155c97b87a22b92b808f86fee25c18db51ab43a36b657d532d2d47d3a7db2f4507a699b72af904bf6d5ed851d1ae1fcfb4833a57096e6c7787211c0f35d
-
Filesize
261B
MD5c2edc7b631abce6db98b978995561e57
SHA15b1e7a3548763cb6c30145065cfa4b85ed68eb31
SHA256e59afc2818ad61c1338197a112c936a811c5341614f4ad9ad33d35c8356c0b14
SHA5125bef4b5487ecb4226544ef0f68d17309cf64bfe52d5c64732480a10f94259b69d2646e4c1b22aa5c80143a4057ee17b06239ec131d5fe0af6c4ab30e351faba2
-
Filesize
52KB
MD56f9e5c4b5662c7f8d1159edcba6e7429
SHA1c7630476a50a953dab490931b99d2a5eca96f9f6
SHA256e3261a13953f4bedec65957b58074c71d2e1b9926529d48c77cfb1e70ec68790
SHA51278fd28a0b19a3dae1d0ae151ce09a42f7542de816222105d4dafe1c0932586b799b835e611ce39a9c9424e60786fbd2949cabac3f006d611078e85b345e148c8
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
192KB
MD5ac80e3ca5ec3ed77ef7f1a5648fd605a
SHA1593077c0d921df0819d48b627d4a140967a6b9e0
SHA25693b0f5d3a2a8a82da1368309c91286ee545b9ed9dc57ad1b31c229e2c11c00b5
SHA5123ecc0fe3107370cb5ef5003b5317e4ea0d78bd122d662525ec4912dc30b8a1849c4fa2bbb76e6552b571f156d616456724aee6cd9495ae60a7cb4aaa6cf22159
-
Filesize
816KB
MD5eaa268802c633f27fcfc90fd0f986e10
SHA121f3a19d6958bcfe9209df40c4fd8e7c4ce7a76f
SHA256fe26c7e4723bf81124cdcfd5211b70f5e348250ae74b6c0abc326f1084ec3d54
SHA512c0d6559fc482350c4ed5c5a9a0c0c58eec0a1371f5a254c20ae85521f5cec4c917596bc2ec538c665c3aa8e7ee7b2d3d322b3601d69b605914280ff38315bb47
-
Filesize
228KB
MD53be64186e6e8ad19dc3559ee3c307070
SHA12f9e70e04189f6c736a3b9d0642f46208c60380a
SHA25679a2c829de00e56d75eeb81cd97b04eae96bc41d6a2dbdc0ca4e7e0b454b1b7c
SHA5127d0e657b3a1c23d13d1a7e7d1b95b4d9280cb08a0aca641feb9a89e6b8f0c8760499d63e240fe9c62022790a4822bf4fe2c9d9b19b12bd7f0451454be471ff78
-
Filesize
18KB
MD5b1827fca38a5d49fb706a4a7eee4a778
SHA195e342f3b6ee3ebc34f98bbb14ca042bca3d779f
SHA25677523d1504ab2c0a4cde6fcc2c8223ca1172841e2fd9d59d18e5fc132e808ae2
SHA51241be41372fe3c12dd97f504ebabb70ce899473c0c502ff7bfeaddc748b223c4a78625b6481dbab9cb54c10615e62b8b2dbe9a9c08eb2f69c54ebf5933efbeb1b
-
Filesize
34KB
MD5798d6938ceab9271cdc532c0943e19dc
SHA15f86b4cd45d2f1ffae1153683ce50bc1fb0cd2e3
SHA256fb90b6e76fdc617ec4ebf3544da668b1f6b06c1debdba369641c3950cab73dd2
SHA512644fde362f032e6e479750696f62e535f3e712540840c4ca27e10bdfb79b2e5277c82a6d8f55f678e223e45f883776e7f39264c234bc6062fc1865af088c0c31
-
Filesize
12KB
MD5192639861e3dc2dc5c08bb8f8c7260d5
SHA158d30e460609e22fa0098bc27d928b689ef9af78
SHA25623d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
SHA5126e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5c6eb196835cf89786d4be6dc47a6bac9
SHA13e977ff34c5108985a3cd2298048ca94853e9799
SHA2560d92222a47789573e07e8cbda7f9519748f522a80fb7bbb61d8ef409b9423ed1
SHA51238677bc10819de479ade6161b22164f9d76079b1fbb8996b28769ec64887b8e386d2e07c46137a47704f4532484b524c39b9b09a80dc3d3bd0650f7760313593
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5f0effac771257485f17ae6a01acf4fcd
SHA1e938b1a8a1db2f0c84955833efd310db571bc070
SHA256814f34c208ddf08f57f989bed22b14f046c2977e6aa163f485288d2aa67b122a
SHA512a5b6e5428f986e7b508b1cd10b7485239fca76ff5419c43d1f75c977c11bd51e90ae63b3d862a319717b6f27084096b070f4e788069dd3efd53a09e43c4091b2
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\EnableLoopback\a8e9750dcec3b7be6005a908fe2c2d8f\EnableLoopback.ni.exe
Filesize160KB
MD50965e5069f4a44a943dd21af16ebea50
SHA14a6866a29d58672a05cdbf764a45c2b682e0cd5f
SHA2562bf8d3166b4b3725564dfdf44072a6fe10c3a08574d7f5ac17aa80d7d3edc29b
SHA512394c6c71bea21aebbc9f625a360e33fbb7512e919988db106c7e4120afd6c8d0b945d3238ae2a7d5f0af2c71122d57bfd8d56133f70ad00e78b65ea9ee7e84db
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.JScript\180d439c36f3cf6ec5649e1360f67487\Microsoft.JScript.ni.dll
Filesize2.7MB
MD5a2ef1f6d5df4e7b6447b54190a3b6ccc
SHA1cbeb2b07942b3d9b95d3a7263629bcbec6b25ce1
SHA2562b14dbd9d9c8050100f813b1e51942520d49ab51ef8ffde16414ac8b35765dd4
SHA512f089315b0435d8f0cfd8523698a36205cbc493cb2ea1c561d811e9141423df20640107ad3507abba44575b970dc010d380fee6e6f3880fc8f91f63f66e000f77
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\6c172340af3f46e7e45d3cea5ee80a56\System.Data.SqlXml.ni.dll
Filesize3.0MB
MD5942af167f631f760c83a8ada0592cb82
SHA173c08eec36472b200554465ee5d6e3f7792704ed
SHA256c662e6d62258cfc15fb0fbb98fc3b428955ba2d7bbceced1e4f87a66d16b173b
SHA51255944b185f4799fa81cd03d4131d6f24506d3b8329c7a0800aae486d9e75d2dcbbef2e564e4d86cfe7bc880a2bf6bac083ccb995429061666333dc56fef68418
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\6c172340af3f46e7e45d3cea5ee80a56\System.Data.SqlXml.ni.dll.aux
Filesize708B
MD53c3231d300935c65976ed0ca2d93f346
SHA170611f15414423d2cb6db3d8bbb384e98df4996f
SHA25696ae9bed2a9512ea7858cc3b28dc28d172cd1c3c15f60fa04ee20b8063a1b1a3
SHA51228f2c7dd019085cd18995232f2a87ea45b834f08d1d4923b799917eceea6d3dfc8b1c1caf7c0a2fb215df79defd095e1d70eda12c2c75475a57e84225da9d666
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Deployment\88b596885c6a2aecfe43892d03c5ba6b\System.Deployment.ni.dll
Filesize3.0MB
MD52ad389cde81c8ddc7056e7eba382c92d
SHA199eebd8f5e3471efd5e13555426c279eb1051a17
SHA256de3a8589468a14dc7a61d19be614081d4b5000ae1604d81894f3399611e4e328
SHA512692e35cf3f0c2351eca65f139975c8c621e60b9a7a88ab12f5d60517e6f3ead20a2b04b47c5f360090d05527e9435ba620776712474829110e67fae25619e7bd
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\0c073f42cf7c0b89bd4ceb4244060ceb\System.Numerics.ni.dll
Filesize314KB
MD573699d2573263453632fe45cff1dc094
SHA1b3df4e2af5e7520eca101c52e7145a85d29ee5df
SHA256cc1326839110e27d2cbf5cf72d74e36ebe6346f65993353cf7c8ea5afd4be381
SHA512489630de5b13fc1cc0ac6c93baa76b9a31da0fa48b9f53fe40d55606d3b5b344fb5bd10e549194a4187f90bb605c39b9d46ba34d93e9436862984b6688f5a71a
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\0c073f42cf7c0b89bd4ceb4244060ceb\System.Numerics.ni.dll.aux
Filesize300B
MD5905fbaf34d730796e231f38c60feffeb
SHA1a8f995d3b27f6ea0feb485870832560025b50e4e
SHA256b04b3113d61b1756e9b8087df88533276adaab7ece3d4e18cba1e956f662f21e
SHA5124716d2ea8f71362bb5264a69abd252276fda352712ef89a7433c66366907a47b96ce3c50925a9036f9f378e5e67de2f94a2a74a4c99ca97930ef6b274c60f6f2
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Runt9064068c#\ab300698ff0e6328a779058c8a6abc9a\System.Runtime.Serialization.Formatters.Soap.ni.dll
Filesize345KB
MD5fa423347a2e17ce6ad208963bcccea75
SHA1bfbe02326cbc38d16fcb7c18ae93cd5b19ef1bf4
SHA25636182d6b01a0529c83f20732a1a62430d3f446bed2a8094b4a5b57423228973d
SHA5123d99f29b8c16fe568d1f2771faad856446da626f7dc368944b4d315d1a6f603c900c70f44346febecc3f709871c3efa37afaf227ac10de81eb30ea0268f54cd0
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\42c7a19a453afb14fda2fe8479e4d8b2\System.Security.ni.dll
Filesize986KB
MD5898474cba76cf084b5d914c0f2f8f07c
SHA18a93edb2b46038c0e4b916f8d48c96abe0cfc241
SHA256f2fd3ae74d836a4f971b4d8eccb109e27cd9e9f8d62ae8a4dd248828d4c936e0
SHA512d1fae5172a4fed48fefc78954390ce356936a3bfb2331640355bc9c3659585b2f1aeda897a2c490586934682083522839b691b45fb2205c87c4cab926d5d5640
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\42c7a19a453afb14fda2fe8479e4d8b2\System.Security.ni.dll.aux
Filesize912B
MD52919ee7ce3a32fb9281b48b99fb0b92c
SHA16aab45597d8a120a9373bac86fe3cbb19ff8e470
SHA256d00cbd723a0870bc12e155e0edd51defcec623bb0c8fe0e927ea196da545e6a2
SHA512b6fdbc82671af88a79e1ea6e0942a493e13a3c2527f3512079dd48b62ca704d988311ce33a944556766cea64d1b4be5460920de938c2e0ac6975e4ec55c714c1
-
C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Web\debe458f6197408829bf76c18c262527\System.Web.ni.dll
Filesize16.2MB
MD56ec78f886589d95ea7f788af3923deb5
SHA1d5247883bfc4f7bf92cc1d3e062eccf89a31f3c1
SHA2564e01f30dcb3ee4cde2ba0d9cebe4958c7ed16b55d549b29559989104c2e8ebba
SHA5129a5375a435f1d11903a7964fe89c31df168ab96ab1c23835705b46fe5c162aebef2df7b2594caad97868dbb97015ee1c0b6241d687034267cdd2d1fad5e7bb8c
-
Filesize
1KB
MD5218a0ba6f4d67451c5de690e2d79a50b
SHA12d88b63c563de1335f76678a7736d16ad0107f77
SHA2565b3d423230067b3cd4270224ff23c0f65c4f0309525f3f0e8a9ecd4b05f633f5
SHA51298043423bbfa6d92ce2b1077639a53ebbbe4af7fb24553e22f34ae68cc5b49d79df7d3ae6a6035567978787bbf467f7ebedc55ff3c8add1c3a20f19cf2f5acf3
-
Filesize
644B
MD5659b7690365e7746edfe6e96c3f11d6d
SHA1fdcd84bb30c5c8adeb6c9341dcba873ad3994c07
SHA25695129a62658451e9a013e7f482bebbd2fd48c2925dca596ade2b5b9bcaa23309
SHA512fc52c330aa042ab816e739f117e1fc0208ea8855ec6a9e19b8e3ab42b18af61794429ae85d1b8b9d902c06ae64897215e721c66674b64b31f7ca6c91034af985
-
Filesize
580B
MD5b094143c78c988ef07a1bf541fccf4e6
SHA1978ba20e486e74fba9cf306a7450240a96cc314c
SHA256e6a53272d081895d24999b96ab02509ef5ac6a30a1ef901dad3f9e62252d8f80
SHA51288eb0924df8c56a1e711b87f1a548b73aa18c90a197a3733c601e90793a4e74a0c771bd764e45111832196b2f81ebd90393c21053b3a93c7d85deee5eb536f5e