Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
23-01-2025 14:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2344.mediafire.com/a84ux21q27tgQ6VhtlUTPk5yw_FoYOWg2Ppvzb9EwLmTB1QkqzzMKAyqwZQ4UU6RI_ffaZSW6tNkL8J4bit9NvRD7JvGxR-hLQav4Vp-NVcfZD1f8noXAf55IgIXZ5DH04bbgARu2KaysBqsbZZRCnyGu4N6tLEyyTpFguT4zDO3/ui2doo7ug0ci0at/Aura.zip
Resource
win10ltsc2021-20250113-en
General
-
Target
https://download2344.mediafire.com/a84ux21q27tgQ6VhtlUTPk5yw_FoYOWg2Ppvzb9EwLmTB1QkqzzMKAyqwZQ4UU6RI_ffaZSW6tNkL8J4bit9NvRD7JvGxR-hLQav4Vp-NVcfZD1f8noXAf55IgIXZ5DH04bbgARu2KaysBqsbZZRCnyGu4N6tLEyyTpFguT4zDO3/ui2doo7ug0ci0at/Aura.zip
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4356 Aura.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250123142722.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\50d85963-1476-450d-9caf-152e72610487.tmp setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aura.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 54 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe10000000df3ef7a0c065db016abf9a70c865db01eeace11ca36ddb0114000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616257" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 14002e8005398e082303024b98265d99428e115f0000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "3" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 010000000200000000000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 3944 msedge.exe 3944 msedge.exe 3344 identity_helper.exe 3344 identity_helper.exe 412 msedge.exe 412 msedge.exe 5684 msedge.exe 5684 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2064 7zG.exe Token: 35 2064 7zG.exe Token: SeSecurityPrivilege 2064 7zG.exe Token: SeSecurityPrivilege 2064 7zG.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2864 3944 msedge.exe 81 PID 3944 wrote to memory of 2864 3944 msedge.exe 81 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 1820 3944 msedge.exe 82 PID 3944 wrote to memory of 4728 3944 msedge.exe 83 PID 3944 wrote to memory of 4728 3944 msedge.exe 83 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 PID 3944 wrote to memory of 3684 3944 msedge.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://download2344.mediafire.com/a84ux21q27tgQ6VhtlUTPk5yw_FoYOWg2Ppvzb9EwLmTB1QkqzzMKAyqwZQ4UU6RI_ffaZSW6tNkL8J4bit9NvRD7JvGxR-hLQav4Vp-NVcfZD1f8noXAf55IgIXZ5DH04bbgARu2KaysBqsbZZRCnyGu4N6tLEyyTpFguT4zDO3/ui2doo7ug0ci0at/Aura.zip1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ff87c8746f8,0x7ff87c874708,0x7ff87c8747182⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:2016 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x150,0x154,0x14c,0xfc,0x148,0x7ff6199a5460,0x7ff6199a5470,0x7ff6199a54803⤵PID:964
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6520 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6548 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6292 /prefetch:12⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7212 /prefetch:12⤵PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6552 /prefetch:12⤵PID:5888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7428 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6752 /prefetch:12⤵PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6640 /prefetch:12⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7620 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7036 /prefetch:12⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7924 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6800 /prefetch:82⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2708 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8016 /prefetch:12⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7980 /prefetch:12⤵PID:6084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16581694275045094747,12342337245127597743,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:952
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Aura\" -spe -an -ai#7zMap30106:70:7zEvent176261⤵
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6024
-
C:\Users\Admin\Downloads\Aura\Aura.exe"C:\Users\Admin\Downloads\Aura\Aura.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54c2eb126a03012e4645cbf12fa576adb
SHA1f4fc0dbbe2fca0aab23014eeee6d533aad91b5fb
SHA256ce9774b847a66f7dce4153518d56469986dedfe78acbcca8e97a64d21df5a1ec
SHA51240008285483a37d186c6feaaea96e92f8d665193eb2cd4af0ccd2e77544fa2afedd8aa89b8f09e49e1d6960cbe8543389151d2413c8be408794b70da0eb122e7
-
Filesize
152B
MD587d33906de07a1c708d64d88278caf05
SHA1adc90f355697bf78fb356544bce655590b24bd87
SHA25646a22c0f86c1d82be2a6e1ce801491338aa21d5367ed2c2ae6a64c31f9d71586
SHA51217ca162b8a9353ea220d99ad4ac1ece0f388812a0bba21460efa96ca793e2e1a768e99285472e0c0a9b4a18cbf8926c25398aa3f8a845d326aadfec408dff9c9
-
Filesize
152B
MD5501a25f290332c25255eaaf70ee6f240
SHA123cba10495d7098ad6de6936cf31c1b0eefd1246
SHA256420c031363bcb69b4cc540b0afad7180d21b4957a2d6eabe23a40e669aeeebcc
SHA51284ba813e4036be7d9fa08d5fab885421017d008f8fe8d99f56313b54f490c9151a27a67734bb17101691df563efef7e5379250f476e869a848f225786a913081
-
Filesize
215KB
MD57b49e7ed72d5c3ab75ea4aa12182314a
SHA11338fc8f099438e5465615ace45c245450f98c84
SHA256747c584047f6a46912d5c5354b6186e04ea24cf61246a89c57077faf96679db6
SHA5126edf4594e2b850f3ede5a68738e6482dd6e9a5312bffa61b053312aa383df787641f6747ac91fa71bb80c51ed52a0c23cc911f063cd6e322d9a1210aea64e985
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5c211a612053207c5330035d1fb24462c
SHA1bf7860582c42ce2c6d4e7451add54a87a0b777cf
SHA2565bfe60d23a74a140a1cf585b878c4f39fe21a07b49bbcd73376e5af697e82de5
SHA512b98171f5feb6ff8c7e2f763a50f5dc3ed11f1f49a62611925686c21ad9171d97ec7366c53ba66400179b03936056ea3786f130be2d5f10e0cdfae5298635540d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD52e9a6216f0a0b11b53ec49941e1f02ce
SHA195ca8ca0f83e6e4eec3c6b1caba5d33dff4f2a39
SHA256a4e65a30115bed70d86a81575e81b362781f2126d949c606d034be99f6d48cc7
SHA51283bc15177a4fd930c9ef64696afdcc18f965b7f196f01c5e1007fa1b2a43b65a99c7034a4fe9fa7e745664a720465b3675649022ca46facc85885b253a9ffde7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b5df77cfb3601e85ccdab3cdebd87163
SHA1110f8a7949cca6a7e393bda4799cffb653ca5950
SHA25669e8c10f89679b2922a97a3ba62ae08d3eb86a37afebdc2700bc522ada939dbb
SHA512c855d4a0dad6c6568ea9874c9cdd7b6c220b0c8978bcdb0be4dc67afca4764ad42ce1b8f65aa04b692fa899c49ebb02340799d812b24909cc47ed9c45ca8a964
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
6KB
MD59aa9a8697b9ac2ad52f4687c1309e3d4
SHA11134646e2dfa7b8be2f3c6638f494eaed9c87396
SHA2565b1c77b5bc8248013583ff968e114088b7292ff7b85044fceeea6de8769b6689
SHA512b37253b9e2146505a15aa1f66f5e2825fcec2b02a66d95f7699369e0d7da724c02eb772679bf1b9a91efb359643423e6c470bf05a2550d6b1525165d803fd0b5
-
Filesize
5KB
MD5b2f8887c2ec5e57bdb50c6a94e7ebced
SHA138d530105a641a49b8ec077cda8efe8c5064b7e9
SHA25614f19ee3d651698996abe993a61fad7f6ab6588f672cec24f990bba2ff4fc30f
SHA512a65a44dceefdb78918aa0d9a98454afb33d9bdacac6d9bc47f0690b7f50f6c608d0ab63800fdc2c9dd4382fdcaeebcfe6d97885993b0d88a837ca5294cd4ba02
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58c8aa.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
10KB
MD532996edae8c88d900782867211948fac
SHA1d2f39e8ef24ab6fd1a4446150c279e1057157145
SHA256a8a52f76c45c2213c6439d64842479dfcc8aa31f5850951c341e11758fa8e59b
SHA512b08e30a28d29bce8e995c51a9bff81b6eb1a6864d07ed6c7efc7e703e4581c103c0c07e5cb320a55bedde9f4eb552cf38a97f757f9120c89070984e07820a690
-
Filesize
6KB
MD5a807850d172aead6f6f7c8fb8d624a75
SHA10f71ce5ca6af4744bd8297d2e8f627831b0e7284
SHA2568fbb356b5b1662d0f36697bcb3b84e64dbcd89ce13fdf6a42b31ba51eea333f3
SHA51211c6d85c5a590bb4431e54defd82f92d94007774b238e62ebb85deebb3fe55d9b88c0d481b76fb1c7d12ed6ad5ead2738524145c1911c6b013f589878acc8d8e
-
Filesize
5KB
MD5fbbf1ecea307b551c3250dcea295bac7
SHA1201614a3524728c6b0e78e2849fa2cec80c35de4
SHA2566528dd55baa9232ef9a3efca347fb95c92c70f13fb4cf5ba4835c1e40a9c0976
SHA512959866f3400145bbfb47cdd7e7edb4ebcce0f747a2539d14b0fc0211d1f0196d352ee005ea5c58dec39edd00ee82e3c0c9e8890cf35cb46809a819910f1ee3f2
-
Filesize
7KB
MD5076f854dc36a3ddbfea6a4c2954649c6
SHA160d239b73fd70ff29a8e4a83499b0dd5ef6626fb
SHA256447f94b4bd223c07dc3a064e24804013cf1727a8d9c7e3070c3e284e248345e3
SHA51276476a02c0d5b3d5283fef36ab5e03fa7d2b83f3f08d3e22b61bb8a791a628272e754fe93749a23b3eed42244e0e67b9e1640bba226456592c9863e52f4c9a9a
-
Filesize
8KB
MD5e3f8c9a715b0ad380b6327992218771f
SHA177aeebdef9e6bf35f661b39482fd09d2eb98464c
SHA2569ea64de93f62c4a057b94969e3372d1075b824df7b8d1bc8692040b1df28eaf2
SHA51222c92c2cae82f51350379866a503d98a5db7175e2232caf418a5f8b4df3fecca22c0ab1b6b33d233dec852d0ea4e0a9437a8e4a82bc53a1f224788a4605ef637
-
Filesize
9KB
MD51c22b67fb57c0b50117f92f57954e74a
SHA13eb88a48cee80b3253a068771190e4b491c5631e
SHA256c6157118f8c78c693fd062dc8ad45dba5be6c878891509c97cd869e97784c38a
SHA512ad190782b4a60757a73876343e59a2b55421a96b5810356e5b18a96e4ab9b27873b9f50ae612be2c0de83dababa4bac42f8f7e22208d294a7a3caaee3e24539a
-
Filesize
24KB
MD594ce4b2ff0abce6d838ac24a1b0f4e73
SHA102f4a956ed4f2e2e0ca9c4b75bf8e7245a1cec88
SHA25606180545891f02875414f56a2a8ca3f21c2f415e03644674cff1c9674cb9b222
SHA512b3bf05777fa4abbd7c475657dea5ca9c00600ab6226843150eff563837c3232c3b513afc0ac5ff1976e35979a51f34710ab74582d1316282bdcb67cc17493c90
-
Filesize
24KB
MD5ef30b5850d78b050b13ae82ee13c6b28
SHA125bcd922ab2c62d47c9bfac3fafcca08317ad8e5
SHA256dfd732ede1af0d6dc560b9fbef26f92f9fdf83a72da3e6910cb39843be4fed30
SHA512f9bdbddff6fe99cacf3a670ab5504849668c9049053eca2a4b51f74eb050ea4d60629ce29a571223b1cf293101d646067f9f00e4fb3039738921e1c042419f8e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD54a1bcd0e3659900cf415037b1880c18c
SHA1c85dcd8224ea33ec004f3dc8a283d8182f3fb906
SHA256656d28342e0822e07d53a17da13080191620f059ea78daea26b5867eaed53004
SHA512ce32b75d27addeec2238d72f4295c403d180e11a3e18b2e846d771f7408d2bc04eae3a0962ff58ef1c01cfd0b80deed5c414352a9c1fd78ad7ce6cf90aa43658
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD513ff263b6511bd873b0167002bf28af7
SHA1a8c3ac87e24fc633d0643bfeb3b753c893574437
SHA25649ac3c12c35a0bd90e5fe33ed5eb24e3553d88b8531b66a18fde6870c60d1fed
SHA5127b2895a8911e420cd01f7db985bec69d9dc8c7f5b79ba9bb7874bae9d8d76f51a1fec572d0c1dd4976eac61ea6b5745715fa45074a20ff904677815125b08948
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe585dbb.TMP
Filesize48B
MD5a8268b6591951c7c0da3f080c35ea470
SHA19360ca7d3e7a77cd50697a96e9401a593faf41f6
SHA256358c42da37c218b2421b93e93dde7aabc183573fa0c6602414753098e1eaf810
SHA512f2e1db697d361ab50fdf9b5abdabb52fcd25a9198b84c5706054e449eca3f376913cbb539236f60d46f6771deae16510e42cd0ef34225341b0072f15e0510f72
-
Filesize
1KB
MD5fd9d06cea37f8cc5b5069dd9d9bea339
SHA1d8f0737d73d600d550a0f53c0693db963de42154
SHA25640715b66eeb9c4c78355795e3df30bb2782acd291a10ef4b9e0d8eeb04ccf70d
SHA512c6028c91100151916676e20400ef34838d1add360324dde19b52dc971c48d39ec450dcc213e2ffe59143c5ae3d7cfdfa2d98cbe00b3dc0d16bf03005a3831b9e
-
Filesize
1KB
MD5bbdc865a1b70863c7e86733cf9cf3365
SHA103dc0eab75b4d60de84edfd6b422a970e7050c86
SHA256931a1784a6051d6abc6d4f263f220aa684d6bda7a5bed029e67abdc641227470
SHA512306ae98894c7ee41564e195ced763638092a636e7e557427c5ee1c343df07037ac2137c8641ef5bc7ce1217985f206a59a19892be2b18af730eac471b8cd5602
-
Filesize
706B
MD5f5d0175a990c7d1b44e8840b81d56507
SHA13e02087cd82d1f7e6365697921d0960f89202aed
SHA256f72171032600c13baee8c647ea56a2a65631ec772b4ae16aec5016eda07af7bc
SHA512a5b55674538f722ac620cc42c0881f36d6730d39317ae407f0f994a688bdb04c2a2f299deddaa84038381de185829fc21a4383583c44e59b9c2ca4f9acdad80e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD57be936f28b80e275877dd62176e96310
SHA16e43e8fbfb58b6a557e66c58fba573af0bab48d4
SHA256da6fbed605110b693c1c2d7bafd1d513d01b2867608c9dedc878ffa513d9f327
SHA512320f8096cd660b67c019eb6479bcfbcf7d4b3b6a93202e61c2e5464affbf6688247d46ff7ee82f693822462e3532f959b749fee82a7b0532298679250ff78d65
-
Filesize
8KB
MD57d62e232f3d52068e0ff742be1fc1937
SHA1c3e6851f0f2d5686582e708645d565d9abdc0645
SHA25634aeef91420dcba0e93f9aadd21f594461d5fc62d4b4e3d981be21a1e1c87579
SHA51294eb876a95d6c631c2b19fecbb01b8f8fd5d02a6cd81ad8aadca099bfc886228871f4a3c132270cc8585ad9b22080af453621338ea0e8d43704205f4cfbe39ed
-
Filesize
10KB
MD57d755c25ee9e207a82eb4391e4635d82
SHA120d053a5e547ac8f72c71091018a28f0ad5cd041
SHA256476a5a600a2bc70712776d2ce23378b1ab3f3d728e17bc46de9b504ca2f54d6f
SHA51271f8a0b3fb06e0d522e22e92675603d3bba0c1b8f4c30e4d0f3fccc48b7281aa6eb3f65f36fc641df09d6bb15e6b5bc454a27cf032f28abb6caf49177bf8d7c9
-
Filesize
11KB
MD5e61d2d1cafdd12a69a0a8523a4c6b7f0
SHA12e58adba8d333b3fb0f99a3d32cf949f793ec3a8
SHA256bbef7738f06fa1628b0efb0e6ac29ba2a4d2caaed4ee5cf49471bcecba8e9d6f
SHA51272bc2377acf3864f705cfc58766c24fa7a4b02d2a8f5f47c3e13511e19e4062c3097c6952abef1fd25bb0333668929ce9d706e8f09432713b919e5480d5f72a6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5ee86c5159708920eca3e90e55941f949
SHA14a0108092269b3cbb8b6f54e7568b5f5635b9e2a
SHA256c30e9125c119fb30bffb5c13d4e83e515024625b5913344082f3c24313f66531
SHA51219a11c2001920137cb5ffb80032b93536312cc28eeb59afb0cf70a47d84babfba2de6b0a18ec295450ffcd3bd0e8c00aca4a07a3297163452f23837ee724d84f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD539dfb4e5a28b94647a7089a4e7322a8f
SHA1a8a1da2f0aa39a0183f0302e7273667fd9fed66f
SHA2564274133d9e2a2e97192ad0d45bccb85042c3429f9955891e79f9f01b99a0836d
SHA512a8bf0b455cb3fe0b5bef2c395abdb0384b1fc0e53ee0af66978c22d0f5b0e1b069547ba9338509dfd464a6f00c391acfc3a3e97f27e99775379a2321552408ac
-
Filesize
494KB
MD54a0b331b2989396ec96ba086515716cb
SHA1bc83cfc66f9feb3e3a8e73a0c1a97e057b2599f2
SHA256ac5d5310123af70db0e6985072448e19e1e714f709a74743a04094807f25c363
SHA5120425e5883f985b685fa390e03f7c6b49de8ca7ab52f3038fcdc564c4e1a8be26405fcbe2810b08b2c0ee75501920a411bbac8b0b2009b633eb2eac479d7e0b4a