Overview
overview
10Static
static
10Malware-1-...30.exe
windows11-21h2-x64
10Malware-1-...40.exe
windows11-21h2-x64
3Malware-1-...32.exe
windows11-21h2-x64
10Malware-1-.../5.exe
windows11-21h2-x64
10Malware-1-...91.exe
windows11-21h2-x64
10Malware-1-...ey.exe
windows11-21h2-x64
7Malware-1-...ad.exe
windows11-21h2-x64
3Malware-1-...ti.exe
windows11-21h2-x64
5Malware-1-...an.bat
windows11-21h2-x64
7Malware-1-...an.exe
windows11-21h2-x64
3Malware-1-...ve.bat
windows11-21h2-x64
7Malware-1-...ve.exe
windows11-21h2-x64
6Malware-1-...ya.exe
windows11-21h2-x64
Malware-1-...re.exe
windows11-21h2-x64
10Malware-1-...ry.exe
windows11-21h2-x64
10Malware-1-...ck.exe
windows11-21h2-x64
3Malware-1-...he.exe
windows11-21h2-x64
10Malware-1-...op.exe
windows11-21h2-x64
7Malware-1-...rb.exe
windows11-21h2-x64
10Malware-1-...ue.exe
windows11-21h2-x64
1Malware-1-...ng.exe
windows11-21h2-x64
6Malware-1-...kt.bat
windows11-21h2-x64
7Malware-1-...o3.exe
windows11-21h2-x64
10Malware-1-...ey.exe
windows11-21h2-x64
10Malware-1-.../m.exe
windows11-21h2-x64
Malware-1-...o3.exe
windows11-21h2-x64
9Malware-1-...32.exe
windows11-21h2-x64
10Malware-1-...nf.exe
windows11-21h2-x64
10Malware-1-.../o.exe
windows11-21h2-x64
3Malware-1-...B8.exe
windows11-21h2-x64
10Malware-1-...ic.exe
windows11-21h2-x64
3Malware-1-...in.exe
windows11-21h2-x64
10Resubmissions
13/02/2025, 01:26 UTC
250213-btppra1pcz 1017/01/2025, 20:14 UTC
250117-yz7h3s1qfw 1017/01/2025, 20:12 UTC
250117-yy9l2sslcr 1017/01/2025, 17:25 UTC
250117-vy9p9sxpez 1017/01/2025, 17:21 UTC
250117-vw8eesyjfp 1017/01/2025, 14:16 UTC
250117-rk9ass1rhk 1017/01/2025, 14:12 UTC
250117-rhv1ds1lds 1016/01/2025, 12:52 UTC
250116-p4et7a1mez 10Analysis
-
max time kernel
895s -
max time network
892s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/01/2025, 12:50 UTC
Behavioral task
behavioral1
Sample
Malware-1-master/2530.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Malware-1-master/2887140.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Malware-1-master/32.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Malware-1-master/5.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Malware-1-master/96591.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Malware-1-master/Amadey.exe
Resource
win11-20241023-en
Behavioral task
behavioral7
Sample
Malware-1-master/Download.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Malware-1-master/Illuminati.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Malware-1-master/Petya.exe
Resource
win11-20241023-en
Behavioral task
behavioral14
Sample
Malware-1-master/Software.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Malware-1-master/WannaCry.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
Malware-1-master/apache.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Malware-1-master/butterflyondesktop.exe
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
Malware-1-master/crb.exe
Resource
win11-20241023-en
Behavioral task
behavioral20
Sample
Malware-1-master/eternalblue.exe
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Malware-1-master/fear.png.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Malware-1-master/getr3kt.bat
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Malware-1-master/iimo3.exe
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
Malware-1-master/jey.exe
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
Malware-1-master/m.exe
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
Malware-1-master/mo3.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
Malware-1-master/mo332.exe
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
Malware-1-master/mysqlconf.exe
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
Malware-1-master/o.exe
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
Malware-1-master/qOA7iZJcoB8.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
Malware-1-master/wintonic.exe
Resource
win11-20241023-en
General
-
Target
Malware-1-master/butterflyondesktop.exe
-
Size
2.8MB
-
MD5
1535aa21451192109b86be9bcc7c4345
-
SHA1
1af211c686c4d4bf0239ed6620358a19691cf88c
-
SHA256
4641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
-
SHA512
1762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
SSDEEP
49152:5aA7f7tlVmdqK23H2bpHI4Qs5ABV9WRHZRsgI82lcHGAaKLinXBgJ:Q+VMkX224QsWBq5SfARGRgJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 580 butterflyondesktop.tmp 3512 ButterflyOnDesktop.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Windows\CurrentVersion\Run\ButterflyOnDesktop butterflyondesktop.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Butterfly on Desktop\is-MKBBP.tmp butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\is-LG1F2.tmp butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\is-2VUOQ.tmp butterflyondesktop.tmp File opened for modification C:\Program Files (x86)\Butterfly on Desktop\unins000.dat butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\unins000.dat butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\is-M6235.tmp butterflyondesktop.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language butterflyondesktop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language butterflyondesktop.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ButterflyOnDesktop.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3228 msedge.exe 3228 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 3944 msedge.exe 3944 msedge.exe 232 identity_helper.exe 232 identity_helper.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 580 butterflyondesktop.tmp 3512 ButterflyOnDesktop.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 3512 ButterflyOnDesktop.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3756 wrote to memory of 580 3756 butterflyondesktop.exe 77 PID 3756 wrote to memory of 580 3756 butterflyondesktop.exe 77 PID 3756 wrote to memory of 580 3756 butterflyondesktop.exe 77 PID 580 wrote to memory of 3512 580 butterflyondesktop.tmp 78 PID 580 wrote to memory of 3512 580 butterflyondesktop.tmp 78 PID 580 wrote to memory of 3512 580 butterflyondesktop.tmp 78 PID 580 wrote to memory of 5016 580 butterflyondesktop.tmp 79 PID 580 wrote to memory of 5016 580 butterflyondesktop.tmp 79 PID 5016 wrote to memory of 4928 5016 msedge.exe 80 PID 5016 wrote to memory of 4928 5016 msedge.exe 80 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 744 5016 msedge.exe 81 PID 5016 wrote to memory of 3228 5016 msedge.exe 82 PID 5016 wrote to memory of 3228 5016 msedge.exe 82 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83 PID 5016 wrote to memory of 1888 5016 msedge.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\butterflyondesktop.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\butterflyondesktop.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\is-5A70H.tmp\butterflyondesktop.tmp"C:\Users\Admin\AppData\Local\Temp\is-5A70H.tmp\butterflyondesktop.tmp" /SL5="$50272,2719719,54272,C:\Users\Admin\AppData\Local\Temp\Malware-1-master\butterflyondesktop.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://freedesktopsoft.com/butterflyondesktoplike.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe1d1f3cb8,0x7ffe1d1f3cc8,0x7ffe1d1f3cd84⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:24⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:84⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:14⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:14⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:14⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:14⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:14⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:14⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:14⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,7218600303071096019,6448136707320188547,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5056 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
Network
-
Remote address:8.8.8.8:53Requestfreedesktopsoft.comIN AResponsefreedesktopsoft.comIN A78.46.117.95
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEctldl.windowsupdate.com.delivery.microsoft.comctldl.windowsupdate.com.delivery.microsoft.comIN CNAMEwu-b-net.trafficmanager.netwu-b-net.trafficmanager.netIN CNAMEedge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comedge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comIN A91.80.49.20edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comIN A91.80.49.85edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comIN A91.80.49.86edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comIN A91.81.129.181edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comIN A91.81.129.180
-
Remote address:8.8.8.8:53Requestwww.google-analytics.comIN AResponsewww.google-analytics.comIN A142.250.200.14
-
Remote address:8.8.8.8:53Requestgoogleads.g.doubleclick.netIN AResponsegoogleads.g.doubleclick.netIN A216.58.213.2
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestfundingchoicesmessages.google.comIN AResponsefundingchoicesmessages.google.comIN CNAMEwww3.l.google.comwww3.l.google.comIN A142.250.178.14
-
Remote address:8.8.8.8:53Requeststatic.xx.fbcdn.netIN AResponsestatic.xx.fbcdn.netIN CNAMEscontent.xx.fbcdn.netscontent.xx.fbcdn.netIN A31.13.73.22
-
Remote address:8.8.8.8:53Requestnexusrules.officeapps.live.comIN AResponsenexusrules.officeapps.live.comIN CNAMEprod.nexusrules.live.com.akadns.netprod.nexusrules.live.com.akadns.netIN A52.111.229.48
-
Remote address:78.46.117.95:80RequestGET /button.css HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: text/css,*/*;q=0.1
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Upgrade: h2c
Connection: Upgrade, Keep-Alive
Last-Modified: Tue, 09 Apr 2019 09:50:16 GMT
ETag: "adc-58615e155e1d6"
Accept-Ranges: bytes
Content-Length: 2780
Keep-Alive: timeout=15, max=100
Content-Type: text/css
-
Remote address:78.46.117.95:80RequestGET /images/menubackground2.jpg HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 09 Apr 2019 09:50:48 GMT
ETag: "41aa-58615e33bc513"
Accept-Ranges: bytes
Content-Length: 16810
Keep-Alive: timeout=15, max=99
Connection: Keep-Alive
Content-Type: image/jpeg
-
Remote address:78.46.117.95:80RequestGET /butterflyondesktoplike.html HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Upgrade: h2c
Connection: Upgrade, Keep-Alive
Keep-Alive: timeout=15, max=100
Transfer-Encoding: chunked
Content-Type: text/html; charset=utf-8
-
Remote address:78.46.117.95:80RequestGET /main.css HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: text/css,*/*;q=0.1
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 09 Apr 2019 09:50:19 GMT
ETag: "1095-58615e1833ae5"
Accept-Ranges: bytes
Content-Length: 4245
Keep-Alive: timeout=15, max=99
Connection: Keep-Alive
Content-Type: text/css
-
Remote address:78.46.117.95:80RequestGET /images/menubackgroundside2.jpg HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 09 Apr 2019 09:50:49 GMT
ETag: "568-58615e34f8b6f"
Accept-Ranges: bytes
Content-Length: 1384
Keep-Alive: timeout=15, max=98
Connection: Keep-Alive
Content-Type: image/jpeg
-
Remote address:78.46.117.95:80RequestGET /slider/slider.css HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: text/css,*/*;q=0.1
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Upgrade: h2c
Connection: Upgrade, Keep-Alive
Last-Modified: Tue, 09 Apr 2019 09:50:56 GMT
ETag: "1999-58615e3ba8951"
Accept-Ranges: bytes
Content-Length: 6553
Keep-Alive: timeout=15, max=100
Content-Type: text/css
-
Remote address:78.46.117.95:80RequestGET /images/superman_likeus.gif HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 09 Apr 2019 09:50:50 GMT
ETag: "7b5f-58615e3597e3e"
Accept-Ranges: bytes
Content-Length: 31583
Keep-Alive: timeout=15, max=99
Connection: Keep-Alive
Content-Type: image/gif
-
Remote address:78.46.117.95:80RequestGET /slider/slider.js HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: */*
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Upgrade: h2c
Connection: Upgrade, Keep-Alive
Last-Modified: Tue, 09 Apr 2019 09:50:56 GMT
ETag: "bfc-58615e3bad770"
Accept-Ranges: bytes
Content-Length: 3068
Keep-Alive: timeout=15, max=100
Content-Type: text/javascript
-
Remote address:78.46.117.95:80RequestGET /images/bodybackground.png HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://freedesktopsoft.com/main.css
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 09 Apr 2019 09:50:46 GMT
ETag: "2e95-58615e31f7345"
Accept-Ranges: bytes
Content-Length: 11925
Keep-Alive: timeout=15, max=99
Connection: Keep-Alive
Content-Type: image/png
-
Remote address:78.46.117.95:80RequestGET /images/banner_bg2.jpg HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Upgrade: h2c
Connection: Upgrade, Keep-Alive
Last-Modified: Tue, 09 Apr 2019 09:50:46 GMT
ETag: "a00-58615e31bd96c"
Accept-Ranges: bytes
Content-Length: 2560
Keep-Alive: timeout=15, max=100
Content-Type: image/jpeg
-
Remote address:78.46.117.95:80RequestGET /images/banner3.jpg HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Server: Apache
Upgrade: h2c
Connection: Upgrade, Keep-Alive
Last-Modified: Tue, 09 Apr 2019 09:50:45 GMT
ETag: "a57e-58615e3163bf6"
Accept-Ranges: bytes
Content-Length: 42366
Keep-Alive: timeout=15, max=100
Content-Type: image/jpeg
-
Remote address:78.46.117.95:80RequestGET /images/superman1.png HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: __utma=49514865.157767241.1737032797.1737032797.1737032797.1; __utmc=49514865; __utmz=49514865.1737032797.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=49514865.1.10.1737032797
ResponseHTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 09 Apr 2019 09:50:50 GMT
ETag: "777e-58615e3586500"
Accept-Ranges: bytes
Content-Length: 30590
Keep-Alive: timeout=15, max=99
Connection: Keep-Alive
Content-Type: image/png
-
Remote address:78.46.117.95:80RequestGET /favicon.ico HTTP/1.1
Host: freedesktopsoft.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://freedesktopsoft.com/butterflyondesktoplike.html
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: __utma=49514865.157767241.1737032797.1737032797.1737032797.1; __utmc=49514865; __utmz=49514865.1737032797.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=49514865.1.10.1737032797
ResponseHTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 09 Apr 2019 09:50:17 GMT
ETag: "47e-58615e1638dbe"
Accept-Ranges: bytes
Content-Length: 1150
Keep-Alive: timeout=15, max=98
Connection: Keep-Alive
Content-Type: image/vnd.microsoft.icon
-
Remote address:31.13.73.22:80RequestGET /en_US/all.js HTTP/1.1
Host: connect.facebook.net
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: */*
Referer: http://freedesktopsoft.com/
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/plain
Server: proxygen-bolt
Date: Thu, 16 Jan 2025 13:06:38 GMT
Connection: keep-alive
Content-Length: 0
-
Remote address:142.250.200.14:80RequestGET /ga.js HTTP/1.1
Host: www.google-analytics.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: */*
Referer: http://freedesktopsoft.com/
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
X-Content-Type-Options: nosniff
Content-Encoding: gzip
Cross-Origin-Resource-Policy: cross-origin
Content-Security-Policy-Report-Only: script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascnsrsgac:215:0
Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to=coop_reporting
Report-To: {"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascnsrsgac:215:0"}],}
Server: Golfe2
Content-Length: 17168
Date: Thu, 16 Jan 2025 12:26:58 GMT
Expires: Thu, 16 Jan 2025 14:26:58 GMT
Cache-Control: public, max-age=7200
Age: 2380
Last-Modified: Tue, 12 Dec 2023 18:09:08 GMT
Content-Type: text/javascript
Vary: Accept-Encoding
-
GEThttp://www.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=2045778244&utmhn=freedesktopsoft.com&utmcs=UTF-8&utmsr=1280x720&utmvp=1263x601&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Butterfly%20On%20Desktop%20-%20Freeware%20software&utmhid=739865576&utmr=-&utmp=%2Fbutterflyondesktoplike.html&utmht=1737032796884&utmac=UA-39364152-1&utmcc=__utma%3D49514865.157767241.1737032797.1737032797.1737032797.1%3B%2B__utmz%3D49514865.1737032797.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=2003350709&utmredir=1&utmu=qBAAAAAAAAAAAAAAAAAAAAAE~msedge.exeRemote address:142.250.200.14:80RequestGET /r/__utm.gif?utmwv=5.7.2&utms=1&utmn=2045778244&utmhn=freedesktopsoft.com&utmcs=UTF-8&utmsr=1280x720&utmvp=1263x601&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Butterfly%20On%20Desktop%20-%20Freeware%20software&utmhid=739865576&utmr=-&utmp=%2Fbutterflyondesktoplike.html&utmht=1737032796884&utmac=UA-39364152-1&utmcc=__utma%3D49514865.157767241.1737032797.1737032797.1737032797.1%3B%2B__utmz%3D49514865.1737032797.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=2003350709&utmredir=1&utmu=qBAAAAAAAAAAAAAAAAAAAAAE~ HTTP/1.1
Host: www.google-analytics.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://freedesktopsoft.com/
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Date: Thu, 16 Jan 2025 13:06:39 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Last-Modified: Sun, 17 May 1998 03:00:00 GMT
X-Content-Type-Options: nosniff
Content-Type: image/gif
Cross-Origin-Resource-Policy: cross-origin
Content-Security-Policy-Report-Only: script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascnsrsgac:169:0
Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to=coop_reporting
Report-To: {"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascnsrsgac:169:0"}],}
Server: Golfe2
Content-Length: 35
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.213.58.216.in-addr.arpaIN PTRResponse2.213.58.216.in-addr.arpaIN PTRber01s14-in-f21e100net2.213.58.216.in-addr.arpaIN PTRlhr25s25-in-f2�F
-
Remote address:8.8.8.8:53Request74.204.58.216.in-addr.arpaIN PTRResponse74.204.58.216.in-addr.arpaIN PTRlhr25s13-in-f101e100net74.204.58.216.in-addr.arpaIN PTRlhr25s13-in-f74�H74.204.58.216.in-addr.arpaIN PTRlhr48s49-in-f10�H
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEctldl.windowsupdate.com.delivery.microsoft.comctldl.windowsupdate.com.delivery.microsoft.comIN CNAMEwu-b-net.trafficmanager.netwu-b-net.trafficmanager.netIN CNAMEdownload.windowsupdate.com.edgesuite.netdownload.windowsupdate.com.edgesuite.netIN CNAMEa767.dspw65.akamai.neta767.dspw65.akamai.netIN A2.16.153.8a767.dspw65.akamai.netIN A2.16.153.60
-
Remote address:8.8.8.8:53Request20.49.80.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request7.98.22.2.in-addr.arpaIN PTRResponse7.98.22.2.in-addr.arpaIN PTRa2-22-98-7deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request3.180.250.142.in-addr.arpaIN PTRResponse3.180.250.142.in-addr.arpaIN PTRlhr25s32-in-f31e100net
-
Remote address:8.8.8.8:53Requestself.events.data.microsoft.comIN AResponseself.events.data.microsoft.comIN CNAMEself-events-data.trafficmanager.netself-events-data.trafficmanager.netIN CNAMEonedscolprdweu06.westeurope.cloudapp.azure.comonedscolprdweu06.westeurope.cloudapp.azure.comIN A13.69.116.104
-
Remote address:8.8.8.8:53Request2.169.217.172.in-addr.arpaIN PTRResponse2.169.217.172.in-addr.arpaIN PTRlhr25s26-in-f21e100net
-
Remote address:8.8.8.8:53Request14.178.250.142.in-addr.arpaIN PTRResponse14.178.250.142.in-addr.arpaIN PTRlhr48s27-in-f141e100net
-
Remote address:8.8.8.8:53Request35.221.240.157.in-addr.arpaIN PTRResponse35.221.240.157.in-addr.arpaIN PTRedge-star-mini-shv-01-lhr8facebookcom
-
Remote address:8.8.8.8:53Request8.153.16.2.in-addr.arpaIN PTRResponse8.153.16.2.in-addr.arpaIN PTRa2-16-153-8deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.73.13.31.in-addr.arpaIN PTRResponse22.73.13.31.in-addr.arpaIN PTRxx-fbcdn-shv-01-dub4fbcdnnet
-
Remote address:8.8.8.8:53Requestfonts.googleapis.comIN AResponsefonts.googleapis.comIN A216.58.204.74
-
Remote address:8.8.8.8:53Requestscontent.xx.fbcdn.netIN AResponsescontent.xx.fbcdn.netIN A31.13.73.22
-
Remote address:8.8.8.8:53Request104.116.69.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.200.250.142.in-addr.arpaIN PTRResponse14.200.250.142.in-addr.arpaIN PTRlhr48s29-in-f141e100net
-
Remote address:8.8.8.8:53Requestfonts.gstatic.comIN AResponsefonts.gstatic.comIN A142.250.180.3
-
Remote address:8.8.8.8:53Requestlogin.live.comIN AResponselogin.live.comIN CNAMElogin.msa.msidentity.comlogin.msa.msidentity.comIN CNAMEwww.tm.lg.prod.aadmsa.trafficmanager.netwww.tm.lg.prod.aadmsa.trafficmanager.netIN CNAMEprdv4a.aadg.msidentity.comprdv4a.aadg.msidentity.comIN CNAMEwww.tm.v4.a.prd.aadg.trafficmanager.netwww.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.71www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.2www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.4www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.23www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.68www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.159.64www.tm.v4.a.prd.aadg.trafficmanager.netIN A40.126.31.73www.tm.v4.a.prd.aadg.trafficmanager.netIN A40.126.31.67
-
Remote address:8.8.8.8:53Requestocsp.digicert.comIN AResponseocsp.digicert.comIN CNAMEocsp.edge.digicert.comocsp.edge.digicert.comIN CNAMEcac-ocsp.digicert.com.edgekey.netcac-ocsp.digicert.com.edgekey.netIN CNAMEe3913.cd.akamaiedge.nete3913.cd.akamaiedge.netIN A2.22.98.7
-
GEThttps://fundingchoicesmessages.google.com/i/ca-pub-0235095201432841?href=http%3A%2F%2Ffreedesktopsoft.com%2Fbutterflyondesktoplike.html&ers=2msedge.exeRemote address:142.250.178.14:443RequestGET /i/ca-pub-0235095201432841?href=http%3A%2F%2Ffreedesktopsoft.com%2Fbutterflyondesktoplike.html&ers=2 HTTP/2.0
host: fundingchoicesmessages.google.com
sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="90", "Microsoft Edge";v="90"
dnt: 1
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
accept: */*
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: script
referer: http://freedesktopsoft.com/
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
GEThttp://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2msedge.exeRemote address:142.250.180.3:80RequestGET /s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2 HTTP/1.1
Host: fonts.gstatic.com
Connection: keep-alive
Origin: http://freedesktopsoft.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Edg/90.0.818.66
DNT: 1
Accept: */*
Referer: http://freedesktopsoft.com/
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Access-Control-Allow-Origin: *
Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
Cross-Origin-Resource-Policy: cross-origin
Cross-Origin-Opener-Policy: same-origin; report-to="apps-themes"
Report-To: {"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
Timing-Allow-Origin: *
Content-Length: 48236
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 0
Date: Mon, 13 Jan 2025 13:31:59 GMT
Expires: Tue, 13 Jan 2026 13:31:59 GMT
Cache-Control: public, max-age=31536000
Last-Modified: Thu, 14 Dec 2023 02:08:40 GMT
Content-Type: font/woff2
Age: 257681
-
1.6kB 21.0kB 16 21
HTTP Request
GET http://freedesktopsoft.com/button.cssHTTP Response
200HTTP Request
GET http://freedesktopsoft.com/images/menubackground2.jpgHTTP Response
200 -
1.9kB 13.3kB 14 17
HTTP Request
GET http://freedesktopsoft.com/butterflyondesktoplike.htmlHTTP Response
200HTTP Request
GET http://freedesktopsoft.com/main.cssHTTP Response
200HTTP Request
GET http://freedesktopsoft.com/images/menubackgroundside2.jpgHTTP Response
200 -
1.8kB 40.1kB 22 35
HTTP Request
GET http://freedesktopsoft.com/slider/slider.cssHTTP Response
200HTTP Request
GET http://freedesktopsoft.com/images/superman_likeus.gifHTTP Response
200 -
1.4kB 16.3kB 13 17
HTTP Request
GET http://freedesktopsoft.com/slider/slider.jsHTTP Response
200HTTP Request
GET http://freedesktopsoft.com/images/bodybackground.pngHTTP Response
200 -
804 B 3.2kB 8 8
HTTP Request
GET http://freedesktopsoft.com/images/banner_bg2.jpgHTTP Response
200 -
3.4kB 77.5kB 37 62
HTTP Request
GET http://freedesktopsoft.com/images/banner3.jpgHTTP Response
200HTTP Request
GET http://freedesktopsoft.com/images/superman1.pngHTTP Response
200HTTP Request
GET http://freedesktopsoft.com/favicon.icoHTTP Response
200 -
719 B 520 B 8 7
HTTP Request
GET http://connect.facebook.net/en_US/all.jsHTTP Response
301 -
142.250.200.14:80http://www.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=2045778244&utmhn=freedesktopsoft.com&utmcs=UTF-8&utmsr=1280x720&utmvp=1263x601&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Butterfly%20On%20Desktop%20-%20Freeware%20software&utmhid=739865576&utmr=-&utmp=%2Fbutterflyondesktoplike.html&utmht=1737032796884&utmac=UA-39364152-1&utmcc=__utma%3D49514865.157767241.1737032797.1737032797.1737032797.1%3B%2B__utmz%3D49514865.1737032797.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=2003350709&utmredir=1&utmu=qBAAAAAAAAAAAAAAAAAAAAAE~httpmsedge.exe2.1kB 19.9kB 19 25
HTTP Request
GET http://www.google-analytics.com/ga.jsHTTP Response
200HTTP Request
GET http://www.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=2045778244&utmhn=freedesktopsoft.com&utmcs=UTF-8&utmsr=1280x720&utmvp=1263x601&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Butterfly%20On%20Desktop%20-%20Freeware%20software&utmhid=739865576&utmr=-&utmp=%2Fbutterflyondesktoplike.html&utmht=1737032796884&utmac=UA-39364152-1&utmcc=__utma%3D49514865.157767241.1737032797.1737032797.1737032797.1%3B%2B__utmz%3D49514865.1737032797.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=2003350709&utmredir=1&utmu=qBAAAAAAAAAAAAAAAAAAAAAE~HTTP Response
200 -
10.8kB 335.3kB 180 281
-
1.3kB 5.8kB 15 16
-
142.250.178.14:443https://fundingchoicesmessages.google.com/i/ca-pub-0235095201432841?href=http%3A%2F%2Ffreedesktopsoft.com%2Fbutterflyondesktoplike.html&ers=2tls, http2msedge.exe3.6kB 77.6kB 53 70
HTTP Request
GET https://fundingchoicesmessages.google.com/i/ca-pub-0235095201432841?href=http%3A%2F%2Ffreedesktopsoft.com%2Fbutterflyondesktoplike.html&ers=2 -
142.250.180.3:80http://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2httpmsedge.exe1.8kB 50.9kB 29 46
HTTP Request
GET http://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2HTTP Response
200 -
2.9kB 23.4kB 22 27
-
897 B 2.6kB 7 5
-
563 B 1.0kB 8 8
DNS Request
freedesktopsoft.com
DNS Response
78.46.117.95
DNS Request
ctldl.windowsupdate.com
DNS Response
91.80.49.2091.80.49.8591.80.49.8691.81.129.18191.81.129.180
DNS Request
www.google-analytics.com
DNS Response
142.250.200.14
DNS Request
googleads.g.doubleclick.net
DNS Response
216.58.213.2
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
fundingchoicesmessages.google.com
DNS Response
142.250.178.14
DNS Request
static.xx.fbcdn.net
DNS Response
31.13.73.22
DNS Request
nexusrules.officeapps.live.com
DNS Response
52.111.229.48
-
283 B 749 B 4 4
DNS Request
2.159.190.20.in-addr.arpa
DNS Request
2.213.58.216.in-addr.arpa
DNS Request
74.204.58.216.in-addr.arpa
DNS Request
ctldl.windowsupdate.com
DNS Response
2.16.153.82.16.153.60
-
286 B 582 B 4 4
DNS Request
20.49.80.91.in-addr.arpa
DNS Request
7.98.22.2.in-addr.arpa
DNS Request
3.180.250.142.in-addr.arpa
DNS Request
self.events.data.microsoft.com
DNS Response
13.69.116.104
-
287 B 479 B 4 4
DNS Request
2.169.217.172.in-addr.arpa
DNS Request
14.178.250.142.in-addr.arpa
DNS Request
35.221.240.157.in-addr.arpa
DNS Request
8.153.16.2.in-addr.arpa
-
275 B 425 B 4 4
DNS Request
22.73.13.31.in-addr.arpa
DNS Request
fonts.googleapis.com
DNS Response
216.58.204.74
DNS Request
scontent.xx.fbcdn.net
DNS Response
31.13.73.22
DNS Request
104.116.69.13.in-addr.arpa
-
259 B 713 B 4 4
DNS Request
14.200.250.142.in-addr.arpa
DNS Request
fonts.gstatic.com
DNS Response
142.250.180.3
DNS Request
login.live.com
DNS Response
20.190.159.7120.190.159.220.190.159.420.190.159.2320.190.159.6820.190.159.6440.126.31.7340.126.31.67
DNS Request
ocsp.digicert.com
DNS Response
2.22.98.7
-
6.4kB 77.8kB 39 67
-
455 B 7
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD581aab57e0ef37ddff02d0106ced6b91e
SHA16e3895b350ef1545902bd23e7162dfce4c64e029
SHA256a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287
SHA512a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717
-
Filesize
152B
MD546e6ad711a84b5dc7b30b75297d64875
SHA18ca343bfab1e2c04e67b9b16b8e06ba463b4f485
SHA25677b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f
SHA5128472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e
-
Filesize
152B
MD5fdee96b970080ef7f5bfa5964075575e
SHA12c821998dc2674d291bfa83a4df46814f0c29ab4
SHA256a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0
SHA51220875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD56ddb109d1b408fa9fa6ddd9479bdc7af
SHA121240bb0c0935e15e69851a6d5baf205fc6e8583
SHA256f85695679148197802f6c07116ec46218e26b5f599f95daa979ca6b94cc4033f
SHA512aab776fd0c782cb047d98b52e5ab6da3e63ec629f6b5ef217d0b417ec42ee545c488c5ccdc726b333fb07c5c8bc41ca5041a4d1a1f9c2ab4eac8a78d344beb65
-
Filesize
1002B
MD5d5ce3ab4f7493fea2f11822d9b90ef44
SHA183a2ff219c24c58c292fe51cc9978f1ced53db02
SHA256bc3cfe96997cdd40e01efc5b304884787c8cfe2f202fe6172a975c4dafc1e31f
SHA51207053b7f0c6ffeab4b1863161195ae9ffc839460a34320bb03663bfb61e3c3440458fab605f033b66dfcf48f056499759d94297cab9d6fac88b56156ecbc490f
-
Filesize
5KB
MD5821e45d939edfe3d37628e889fccbf60
SHA18d486173d5bbaed16d05d2d1c7b97ee73fcb1a3c
SHA256a81e46185a162c9ed5103f5d653eaf5c366359d4a0aa70e8530844e584a82189
SHA512a1af3ac84b258b9977d0b5b80621521647f25fe6a40c01947d77905256782c376f2b91ad52e9a73e58ed570e1bf97e623923239dcca369e2b2db9a95ec944920
-
Filesize
6KB
MD5f60ae7e2e819769989772f8b0d7e6422
SHA1ce8409ea940a25a6e9747410c898ad15fc4809cf
SHA25645bba6618de5234c72b8ad9b984176c662e6569bc6992bc29c01bb449d72c908
SHA512a8d9bbeb1857e575b1a67377748bbfcc2a2fbd0180527f55f2f176a8fcb0e22e4b1ffee7e9210db5f0d6257c1a829e7cbcbbd0adfd751e65d912403696c27c9c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5a5f19c0577e56ffa4b0a6afff052843e
SHA1ba5263ef027b8959a8ab4b5fe395882b00a9d90b
SHA2566f9196be5787a977341d9b22c4fe156eb2586135e2e7070d707712ecce393484
SHA512aa3f03562c1cf408c38ca94bb9890d5d6e216c5256fa5ab70edcaac77d18964d075426164b7c449454f2fe1700a4b281e39881ae1c4bc255fbe5547cb95111d0
-
Filesize
10KB
MD5befc490783d180f7488d0fc9a7c62576
SHA1498e1ae82f783dfb8b595ce72d73c5452bfb5f5b
SHA2561a8cf083abe0e47013cc7e387d3bf951d765521b3f5aded4d46659e5920d4eed
SHA512443adc60ec6e7b287fabb03ef18b184feeec653cdfb92a1aa14032e8a04dc64642855f3816b85b6f2311541f31b09393b0647bc14cb83f42fb1c0a672f12a7e9
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891