Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
30/01/2025, 16:48
250130-vbellsxja1 1030/01/2025, 02:38
250130-c4rsjawmey 1030/01/2025, 02:32
250130-c1k6ksvmdj 1030/01/2025, 02:25
250130-cwajaawkgt 830/01/2025, 02:21
250130-ctg6cawkct 830/01/2025, 02:17
250130-cq6drswjgx 1030/01/2025, 02:13
250130-cnxnvavjhn 8Analysis
-
max time kernel
386s -
max time network
388s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/01/2025, 02:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win11-20241007-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file 2 IoCs
flow pid Process 32 4172 msedge.exe 161 4172 msedge.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS procexp64.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCEXP152\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCEXP152.SYS" procexp64.exe -
Executes dropped EXE 15 IoCs
pid Process 3136 procexp64.exe 3156 $uckyLocker.exe 1636 NPE.exe 4420 NPE.exe 1664 NPE.exe 200 NPE.exe 3192 NPE.exe 1952 NPE.exe 4348 NPE.exe 484 NPE.exe 1292 NPE.exe 1896 NPE.exe 1148 NPE.exe 1052 NPE.exe 1328 NPE.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: procexp64.exe File opened (read-only) \??\L: procexp64.exe File opened (read-only) \??\Q: procexp64.exe File opened (read-only) \??\S: procexp64.exe File opened (read-only) \??\T: procexp64.exe File opened (read-only) \??\X: procexp64.exe File opened (read-only) \??\J: procexp64.exe File opened (read-only) \??\O: procexp64.exe File opened (read-only) \??\W: procexp64.exe File opened (read-only) \??\Y: procexp64.exe File opened (read-only) \??\Z: procexp64.exe File opened (read-only) \??\U: procexp64.exe File opened (read-only) \??\E: procexp64.exe File opened (read-only) \??\I: procexp64.exe File opened (read-only) \??\K: procexp64.exe File opened (read-only) \??\M: procexp64.exe File opened (read-only) \??\N: procexp64.exe File opened (read-only) \??\P: procexp64.exe File opened (read-only) \??\A: procexp64.exe File opened (read-only) \??\G: procexp64.exe File opened (read-only) \??\H: procexp64.exe File opened (read-only) \??\R: procexp64.exe File opened (read-only) \??\V: procexp64.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 32 raw.githubusercontent.com 1 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Control Panel\Desktop\Wallpaper = "0" $uckyLocker.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\$uckyLocker.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\NPE.exe:Zone.Identifier msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language procexp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $uckyLocker.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 procexp64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz procexp64.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202020202020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\3 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\3\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\SniffedFolderType = "Generic" explorer.exe -
Modifies system certificate store 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 procexp64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 procexp64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 19000000010000001000000045ed9bbc5e43d3b9ecd63c060db78e5c03000000010000001400000002faf3e291435468607857694df5e45b6885186868000000010000000800000000409120d035d9017e0000000100000008000000000063f58926d7011d000000010000001000000006f9583c00a763c23fb9e065a3366d55140000000100000014000000adbd987a34b426f7fac42654ef03bde024cb541a620000000100000020000000687fa451382278fff0c8b11f8d43d576671c6eb2bceab413fb83d965d06d2ff20b00000001000000260000005300650063007400690067006f0020002800410064006400540072007500730074002900000053000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000001400000009b9105c5bba24343ca7f341c624e183f6ee7c1b20000000010000003a040000308204363082031ea003020102020101300d06092a864886f70d0101050500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74301e170d3030303533303130343833385a170d3230303533303130343833385a306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100b7f71a33e6f200042d39e04e5bed1fbc6c0fcdb5fa23b6cede9b113397a4294c7d939fbd4abc93ed031ae38fcfe56d505ad69729945a80b0497adb2e95fdb8cabf37382d1e3e9141ad7056c7f04f3fe8329e74cac89054e9c65f0f789d9a403c0eac61aa5e148f9e87a16a50dcd79a4eaf05b3a671949c71b350600ac7139d38078602a8e9a869261890ab4cb04f23ab3a4f84d8dfce9fe1696fbbd742d76b44e4c7adee6d415f725a710837b37965a459a09437f7002f0dc29272dad03872db14a845c45d2a7db7b4d6c4eeaccd1344b7c92bdd430025fa61b9696a582311b7a7338f567559f5cd29d746b70a2b65b6d3426f15b2b87bfbefe95d53d5345a270203010001a381dc3081d9301d0603551d0e04160414adbd987a34b426f7fac42654ef03bde024cb541a300b0603551d0f040403020106300f0603551d130101ff040530030101ff3081990603551d2304819130818e8014adbd987a34b426f7fac42654ef03bde024cb541aa173a471306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74820101300d06092a864886f70d01010505000382010100b09be08525c2d623e20f9606929d41989cd9847981d91e5b14072336658fb0d877bbac416c47608351b0f9323de7fcf62613c78016a5bf5afc87cf787989219ae24c070a8635bcf2de51c4d296b7dc7e4eee70fd1c39eb0c0251142d8ebd16e0c1df4675e724adecf442b48593701067ba9d06354a18d32b7acc5142a17a63d1e6bba1c52bc236be130de6bd637e797ba7090d40ab6add8f8ac3f6f68c1a420551d445f59fa76221681520433c99e77cbd24d8a9911773883f561b313818b4710f9acdc80e9e8e2e1be18c9883cb1f31f1444cc604734976600fc7f8bd17806b2ee9cc4c0e5a9a790f200a2ed59e63261e559294d882175a7bd0bcc78f4e8604 procexp64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 procexp64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 procexp64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 procexp64.exe -
NTFS ADS 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\NPE.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 63572.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 73383.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\$uckyLocker.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\ProcessExplorer.zip:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 236357.crdownload:SmartScreen msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3380 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 3052 msedge.exe 3052 msedge.exe 2676 identity_helper.exe 2676 identity_helper.exe 3640 msedge.exe 3640 msedge.exe 3108 msedge.exe 3108 msedge.exe 2324 msedge.exe 2324 msedge.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3136 procexp64.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 38 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 3136 procexp64.exe Token: SeBackupPrivilege 3136 procexp64.exe Token: SeSecurityPrivilege 3136 procexp64.exe Token: SeLoadDriverPrivilege 3136 procexp64.exe Token: SeShutdownPrivilege 3136 procexp64.exe Token: SeCreatePagefilePrivilege 3136 procexp64.exe Token: SeShutdownPrivilege 3136 procexp64.exe Token: SeCreatePagefilePrivilege 3136 procexp64.exe Token: SeDebugPrivilege 3136 procexp64.exe Token: SeImpersonatePrivilege 3136 procexp64.exe Token: SeSecurityPrivilege 3136 procexp64.exe Token: SeDebugPrivilege 3136 procexp64.exe Token: SeBackupPrivilege 3136 procexp64.exe Token: SeRestorePrivilege 3136 procexp64.exe Token: SeDebugPrivilege 3136 procexp64.exe Token: SeDebugPrivilege 1636 NPE.exe Token: SeDebugPrivilege 4420 NPE.exe Token: SeDebugPrivilege 1664 NPE.exe Token: SeDebugPrivilege 200 NPE.exe Token: SeDebugPrivilege 3192 NPE.exe Token: SeDebugPrivilege 1952 NPE.exe Token: SeDebugPrivilege 4348 NPE.exe Token: SeDebugPrivilege 484 NPE.exe Token: SeDebugPrivilege 1292 NPE.exe Token: SeDebugPrivilege 1896 NPE.exe Token: SeDebugPrivilege 1148 NPE.exe Token: SeDebugPrivilege 1052 NPE.exe Token: SeDebugPrivilege 1328 NPE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe 3136 procexp64.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 3136 procexp64.exe 1636 NPE.exe 1636 NPE.exe 4420 NPE.exe 4420 NPE.exe 1664 NPE.exe 1664 NPE.exe 200 NPE.exe 200 NPE.exe 3192 NPE.exe 3192 NPE.exe 1952 NPE.exe 1952 NPE.exe 4348 NPE.exe 4348 NPE.exe 484 NPE.exe 484 NPE.exe 1292 NPE.exe 1292 NPE.exe 1896 NPE.exe 1896 NPE.exe 1896 NPE.exe 1148 NPE.exe 1148 NPE.exe 1148 NPE.exe 1052 NPE.exe 1052 NPE.exe 1328 NPE.exe 1328 NPE.exe 3136 procexp64.exe 3380 explorer.exe 3380 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1484 3052 msedge.exe 77 PID 3052 wrote to memory of 1484 3052 msedge.exe 77 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4128 3052 msedge.exe 78 PID 3052 wrote to memory of 4172 3052 msedge.exe 79 PID 3052 wrote to memory of 4172 3052 msedge.exe 79 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 PID 3052 wrote to memory of 4868 3052 msedge.exe 80 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xe4,0xe8,0xdc,0xe0,0x10c,0x7ffdcc063cb8,0x7ffdcc063cc8,0x7ffdcc063cd82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2508 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2540 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6792 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6876 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6760 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6508 /prefetch:22⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6624 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6964 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2536 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6604 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7732 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7756 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7404 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7628 /prefetch:82⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7692 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7984 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7948 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7888 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5203186163692231963,17720901046763007178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2428 /prefetch:12⤵PID:2264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2156
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1076
-
C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe"C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\procexp64.exe"C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe"2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3136 -
C:\Windows\explorer.exeexplorer /select,C:\Windows\System32\WerFault.exe3⤵PID:780
-
-
-
C:\Users\Admin\Downloads\$uckyLocker.exe"C:\Users\Admin\Downloads\$uckyLocker.exe"1⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:3156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2252
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1636
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4420
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1664
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:200
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3192
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1952
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4348
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:484
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1292
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1896
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1148
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1052
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1328
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3380
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
4Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56412677c57cf7fb38bbc26d0708a6f12
SHA1d66810a1a257307aaafe8ff8b34c19968830c4ae
SHA256fc85a44306c0020903b0f922943fc1240226bfd646a0a23e70bed864bf379293
SHA5120831214f343fbca4de2f83b870711e34f95abdc58c593548157f27e6ee5787608ee9dfa6af4b991e2eda052c47b91fef3be3229dd792b2ce907042b3491fd78e
-
Filesize
157B
MD57faf19cf36959a21a75239731909299c
SHA112cf2ac30b40e2eadd145d11460d65a9b22a0d5c
SHA256bcd5b16a8ad02dbfe3958505935f39da36ebf2ecda6206b671954c263332eb85
SHA512dfc190b9f52640879ab03796a97c8c42c58dd01f98926b6b45ca436cc45e36c9948bca970e092eaabbb643491dd535c013ca66217c72f93da9948743d7236b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5
Filesize471B
MD51380c84603e9daea204d6fc175abc6c7
SHA1f54c3f6dfbd81add6e0e78e5e52c616991c9f17b
SHA25656a7b2f2f4fcb5eb15fd3bd5d27fca16af9af491c608cb3ccf74237dd6f2bed5
SHA512c94857716b4a3b9cf439a9fa6daa70d8011b3b4c773c848ea4b90c079d0a9cdf5ee9ce78ada54452b66e4315d8ac2716b5caef2dda1ea2e20684bf1e259246a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5
Filesize404B
MD5e16bf72ef00fd35ade29fd659b4fee4f
SHA1be753ebb407457dc3e5a5439f414e220d18227dd
SHA256234de8030ac532fba6ae1bc3e0e011aa9f113a72e0df1b52648b0bbaf7c3c38e
SHA512ebff00bb48f6e4b7ca9cc32d9c6e49189b35dea01439787b1e2e105cc702d69a6417836227b9813339d671303ced475ed0a189bd70bb4d38f31261d075390a93
-
Filesize
152B
MD5aad1d98ca9748cc4c31aa3b5abfe0fed
SHA132e8d4d9447b13bc00ec3eb15a88c55c29489495
SHA2562a07cac05ffcf140a9ad32e58ef51b32ecccf1e3ab5ef4e656770df813a8944e
SHA512150ebf7e37d20f88b21ab7ea0793afe1d40b00611ed36f0cf1ac1371b656d26f11b08a84dbb958891c79776fae04c9c616e45e2e211d292988a5709857a3bf72
-
Filesize
152B
MD5cb557349d7af9d6754aed39b4ace5bee
SHA104de2ac30defbb36508a41872ddb475effe2d793
SHA256cfc24ed7d1c2e2c6585f53db7b39aa2447bf9212487b0a3c8c2a7d8e7e5572ee
SHA512f0cf51f42d975d720d613d09f201435bf98c6283ae5bc033207f4ada93b15e49743a235a1cfb1b761bde268e2f7f8561aa57619b99bff67a36820bc1a4d0ec4a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\570d9afd-fed8-4af6-abd4-d89d788b5fd6.tmp
Filesize1KB
MD5a844ab657922e179d6d9f2d283438e0a
SHA135eb1ea9a9c84f05ce53b31ca379dcb7982454b3
SHA256070762f7ba9760ff114fe12d86fb3c6a57cebed2523357d85ff08398b8afc71f
SHA512cd256f63e4485da3060c9fbc52531f8476a9505dbf1117e513261e0ac52de477c560fb2d231ce9e98306381e6a30eb7cc396e3307ff1671c3eb14ff818784b85
-
Filesize
48KB
MD526440793d8a21119faf2a2eb91280f5f
SHA1e7d6b1b045c07f1373ca67ec838c2b59deae4999
SHA25665ef6675c2ff98d15ccaf1c248981e63893bc6ef8541358115828194854fee91
SHA512d125b4ad58ca33f04f4a738faf035ad4bbb8856e817345e6c0e421e19692bd56bc55946a6f25acf57072da8a3f762eec41d61506ae3f5535328f60f08a01a810
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
67KB
MD569df804d05f8b29a88278b7d582dd279
SHA1d9560905612cf656d5dd0e741172fb4cd9c60688
SHA256b885987a52236f56ce7a5ca18b18533e64f62ab64eb14050ede93c93b5bd5608
SHA5120ef49eeeeb463da832f7d5b11f6418baa65963de62c00e71d847183e0035be03e63c097103d30329582fe806d246e3c0e3ecab8b2498799abbb21d8b7febdc0e
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
26KB
MD5c9a44eb6dc1c77a9a2d988768c9fd5c9
SHA1f352d7ed33ff0d8361be168a6b5300288d91ef78
SHA256675b4a74249edb71579147676a8115b662a915db9fd24fdfcaebbb0d7618c62c
SHA51281534ba808f32ade00a81349612c9b905914004c3a8d7e53e9993170ab5957600dd49d9881284541240181987ffc76208acedfac24bc1e8d33c99f003c65fbff
-
Filesize
40KB
MD53051c1e179d84292d3f84a1a0a112c80
SHA1c11a63236373abfe574f2935a0e7024688b71ccb
SHA256992cbdc768319cbd64c1ec740134deccbb990d29d7dccd5ecd5c49672fa98ea3
SHA512df64e0f8c59b50bcffb523b6eab8fabf5f0c5c3d1abbfc6aa4831b4f6ce008320c66121dcedd124533867a9d5de83c424c5e9390bf0a95c8e641af6de74dabff
-
Filesize
53KB
MD568f0a51fa86985999964ee43de12cdd5
SHA1bbfc7666be00c560b7394fa0b82b864237a99d8c
SHA256f230c691e1525fac0191e2f4a1db36046306eb7d19808b7bf8227b7ed75e5a0f
SHA5123049b9bd4160bfa702f2e2b6c1714c960d2c422e3481d3b6dd7006e65aa5075eed1dc9b8a2337e0501e9a7780a38718d298b2415cf30ec9e115a9360df5fa2a7
-
Filesize
214KB
MD5ba958dfa97ba4abe328dce19c50cd19c
SHA1122405a9536dd824adcc446c3f0f3a971c94f1b1
SHA2563124365e9e20791892ee21f47763d3df116763da0270796ca42fd63ecc23c607
SHA512aad22e93babe3255a7e78d9a9e24c1cda167d449e5383bb740125445e7c7ddd8df53a0e53705f4262a49a307dc54ceb40c66bab61bec206fbe59918110af70bf
-
Filesize
36KB
MD562fd1704573f0a1ae4c7db83f9f5b470
SHA109d03a37492cfd0580ed3b819386bbc4ff64d960
SHA2563b14ad4d4df0e681fd5aba556473e39e52b31ab98f51dc3db4937bb641a6d667
SHA512c8108393f8bb91c018ee06ad51d746a33e24ad9041d5cd84792e4c59fb55639b8042ed5c1a424b47263652182ceafe516d0b6adab147e33bbf261d6aee1d3f84
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5f56f4de7c8c516d9a4e543413d580b8d
SHA1da65b84cf77c721f862954bebe2a64ee1368c762
SHA2566c56fd8228a8a650536b671aee13e3ff3a7068d46eb6ed3296dc426492a99e4e
SHA51260d6c4b9bab6303658ae0888e6ef2bb6c1260e5e23edea9e628c841cfa99b70abaad76860945e4c13239c6346d8f057e119682d7dfcb70ac89b98535d3b01ede
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5af8c1e7842e9cf9dff7017c8a9c1a27a
SHA115dec9a708eb5230b9abd7824251c809f532804d
SHA256d4656c3ff3de1277fb484acbd2a87b2ff52a9ef410ea033502461ea0bcdb4aea
SHA512a7d493843b58d6848aa5667898b03a023e97e72febb8c0693f1695ecce0c6e8f968b7210f5f87d548d4b191e188882058f32b69b27536348e80a07feb72a94dd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD571ce63ba96780e02f5e3155544467b5d
SHA10b8fe473e3f3c212174f2f245bbd88cb6e60ed7e
SHA25618679ae872a6064f358b9332809840d184a0ac5db8c58958b042371aeec69c7b
SHA5126a8baab09fbb9b71faf2386e94ffde25b6f8ff7cf40fcb90c4096ea691836a79ba5a28eb79265522880ddcd3f6956f0b1e71775e7442ba55818a60d10e24e23c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD56c0924cecc9ecd30471f498e930534bc
SHA179fdf5494eefa1b6010ef19f03efa1469571107b
SHA256e520fc75613d399671c62a1466596c09495150fcbf6812ade275edf71e906551
SHA512ef3ab550556cb23a0dc1d8f07d54ff540d773bbf76087f46895638c3b6abc67ac737208f3e81ffbd859c51a2b9e249b36c91ab6c062811f18ca3879a522633a5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD5a6b44117aca60b8da487558b9b1f2247
SHA1d4f47f3c8fd0e21e35f9f59a30d64f3a7a86055e
SHA256bb60f802979b5ad5bca5a7936db1c6bf346f7cf758c5f0ba351b572aa5a5de91
SHA512229ef1657cedbc3867708139267970cb2c42855ec0786c33987cca7d6bbfa4daaca8693883953bcb62738e5b0f5c3aa14f4e580999948d950a1d2a397435c2a6
-
Filesize
3KB
MD5435f1ba96767f38cbc6ef950c43d63bc
SHA108907fdb443bee6d2d6ed2be08f7f3f50b8b8a3e
SHA25665af8ede969cf4d7e15f939930cdea8d893edcd15fb51eff69c42952dc6184ae
SHA512f82c4604511170a9db207e507dd5cb158bd5a576c8664b6de102007e1c93f302dce0e0d63d262d56c513c6d44d724454ba41fdebe1bbac9b29f561ea256806a8
-
Filesize
6KB
MD546382e00487e57914cd3ee69bc222470
SHA16722a934f22acfa4f9097a439f4d4288bc5c45f9
SHA256e24ad0025c73d710806e0cceed49b13da0d4e65099a4e53b52fcbf8891a093a1
SHA512d491d05b806b61d0d092a2028550bb076046bbc7b4f980fce2bd2b2c6e3a63d833a4eaf01aadbe02b0e1dc5aa5c1b1fc778bb01ca3f1cb0deb2ace249c7ba045
-
Filesize
6KB
MD5b439d0a2c6a7e3eb64ccf32b42a5fa57
SHA185b9ba0df28258d0eadeab12c976f3edfdfc716d
SHA256fa4e1cf322580d02cc51b1f66484aed839c7069359da6a61c7d59819188d3930
SHA512dbc6bbed574cb38ca7d1b19be3a9e71d0fc6e00bf3af215a81b2be7a4b64152f58b416be5db8f6cc1d706e19e9704829376c02d1d7bc24c8a9a8de061d5af679
-
Filesize
6KB
MD5a9a1ec30b9ccc7c528f3fcbfaf868f09
SHA1cc4a0b637f8a54d923aff9db48c6a365b500f270
SHA25640c65d72ff0f681c450c516c4ce54d7674ca8d46fcfaa83a7ffa2f3df6425aa4
SHA512694d76cf71aacb1a831106f4ca67e705e212d4648f3021b0cba0b5aa7a54212fad51bd51f1d9014ebe37fede07f498ccbcf2c5d526ba24ba2d758bfc4d1529b5
-
Filesize
5KB
MD51983b55d47dfe8e39d214af154f5fb7d
SHA1bb5963f5fb81e6648d436aa27d419bb42d5944ef
SHA2561cef092524040d65c9b1f5ce8a66190d1e49c3f5e6861d42982ffc04bb5cb739
SHA5123b8ac9330fdc6a74ef337b2ebe61053a9ccd7c5d1c5ec112ca7d322d29febfdebb6f562b9b1431da3e8bd45444bef4e31e4c8dff95b89ad5cc3ba79fb1e2d9be
-
Filesize
6KB
MD5a3b51da55ed4643158b870f5f3beb3fb
SHA1e969c708d366d656960a5d56ae4856456a67033f
SHA2563f5f1a339c838e3eac12a9b4d0aac15036d7aea1a71cd3a2db57dd87e4206e21
SHA512ee27eec797a3607e879c662243a806429af629ec259ef40ad64bd7e9cdd8bdc0017c561b22bcdbac989c13324678738f74790ff473cb175960fddf10f9301cdf
-
Filesize
6KB
MD5523a544fc92b49c0d0465750479314b3
SHA1f0dce6155ad2e30cf57c0a470c7bd0bbec1d0333
SHA2566574ff823b36d83917d4014f1e30ada0b6242d1f3aeb2ded4d99708797ea630e
SHA51266630dfe9dc14a64df5ba6af2853984a025b7aef57a2b1d59e6c5766e8d6721852ce8b8cb46f598c938b5b4ba98a7888f7cd5394ecf14bfb33115d2fc56f5a07
-
Filesize
6KB
MD5d777badb4497a52cfd82b6b6d6c0065d
SHA173e57105652493739ed864209cd60ae2e75c98a6
SHA256023859a5cc42363488513b536f9eb33192a530ab2a1edea04f4119e9d008e0e3
SHA512d979216a77f18b419bd3eb72655f544fe8c1c0dc429490f0bc4428d94a9e6ee54f44d625fe5816c34ebdd8ee16ca0e81d40929835c41e5f08223c91368d06d6c
-
Filesize
9KB
MD5990b1d63472517ceee6d0bf74566ee1f
SHA1ddb12fe0039fc749308cefe37a215df6b9ac0a13
SHA256037facdded95f12d773443dd74b3d91de11d97f588150acc30bd238e66298f2e
SHA512b31b6d023f86a27cd91424b79fea505826957f80a46fac9c350c3541d81fa6be2325152e01de6d1967dd484e59a332ce6215334f9e536a062124985f2c2e54af
-
Filesize
9KB
MD58954f72969adb05a91d8809ecc2668bb
SHA1138c3bcee48f86cb53fb178dda3849b962b451d9
SHA25619eb8c898ef15d89547813b3a8d002cf0195ac44d90633a07033e75af5482dee
SHA512290d35ff029e3d18fd4b191e7c9a81ae351ef7a53bcb4eb8320e273ba3f9938627e008d194ab0e347161e2e1ba2f1cbe3fb9f784ba651c09af3267198d155799
-
Filesize
9KB
MD5a341235eb823f60a89777ca66a828bc1
SHA1c2ab346cc2b8de2ad67e3d3fdae72a86740b3d36
SHA256921d616ed7b2258aab79bd4de76b84aa5e9acd684118763d3d6b1da5ab618bbe
SHA512a71b3c2e02197dc561d200502822ef0159949b637cf570c906221cd2d0bfbc72ef67c353c7fded17f7dc5b0d9ef39fe66fc741011c485570ce0c4d06c190bca9
-
Filesize
7KB
MD517e23a1ce7e2c9d7b5814a7eee22c533
SHA15fe68227ebb982b50b7fbb6e62ea6402410ecf1f
SHA256c29ee23f79275c522c5a01164774560a31e32c0d0426979e418d50c8c6441e54
SHA512c1f199c1f95a91096060c898331e3e8f11881578c6dceb07b154af5d0b335b97a426bfe9bfddbee8add01740c2126cbe88fa002b164455561a37a991ceeb9cc2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5cfa32092000fa2202fc8327cab588aa4
SHA19f2ee866f30376c0dac8eacb134750e657602a60
SHA256d25a0e1b7def375b8fa60fc4f1fc6ba47a14007c02500edd4d99f9b9a7950212
SHA512e7150e894c08b92404fb35b3d53945d21f1a2b9649b8bfb0b1adac3f6f34f3282db7e54f8d828b3b420ab2c25d5e621d0098cce512d4095d95287972d2af0593
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5fe553071744b6f5e94d78f01b5e5893b
SHA1989a03932e56db54ceb4292f5c5be2415bd5ba5e
SHA2562a5c1b5cbf13af53552a35bd0122e575c1756d3284269d72c0caf5b3e6455286
SHA51222b3d1f2732ffa5d72c5a3b5d0a9f5caadfc8427414ed37a0dd8534e0ea651439872f309c917fc3e9ee3b3b15d912e3762e43e2d329e2ac83763c6875e7f8462
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe596d95.TMP
Filesize48B
MD55b8ba8bf2ffba4630c45eb9347bd77cd
SHA11572aad8f81b7329683ce68676e9bdd1f5e01050
SHA2560b948cc38b3a6d65a18aeade40960dc458edecea81e44afd885174749fb185fe
SHA512c977b78325556c6a2179078e27ef4c252c92290d5c8c61169fa1e06c4dc0578a03ddefc8bdc3fefbd0d03c6acaad592ae0ad03cc8f520df835c49b7f1eb52852
-
Filesize
1KB
MD5fc754df508b2eb0407397d578befa3f9
SHA1da17014d50b0507204e61d622a05dcea52548963
SHA2568c4c61ef117a5cf5598e81a4b5fe012766bcd6cbdfee8083ef1d95fbb3643600
SHA512b98e24163d1148ce878e9e296eb9d6d22e63fd909c9f0c3f30626ad94af4701a446c5efae09e4f2da0fb44ebb167854ccf40b6cf04ce1384a1431edf893f6204
-
Filesize
4KB
MD5d73375d5bb776c5d5e956da453cc5984
SHA1ca1bb318349c2fa8ad7f922516660c4cce6f73a2
SHA25679f76e8fc5d9ec9677df71e83d7f9d27a9ea05332a1c5536fb4531838dd61777
SHA5125b473682fd6375c4e3c56fbf299017be21e71cd99e724e33d3c9f1f6cf1bff2e5d286a0752f1fc76440e0c29b4628abc9033c34478a8065c4cc383b34bb6f7b4
-
Filesize
1KB
MD55dea44d8751e47d4ca830fa53960df21
SHA1f8d92145f7aa9483a137fcf1479ab3a64e597f13
SHA256e6189f4f950fd2c42909c1ed6394253a8ca7dd00abe6dd5936472018f0a28f7f
SHA512428fc1b8dd00a85940ebdacb6846dc3f2361e45fa96ed54801793e711957c148b2ea797e3fc5e20564d303c84a0cbfe22fd77a0daf16365148134c63b2a3a22f
-
Filesize
1KB
MD54935b8fe58886b803210e3917a0d8ecd
SHA1529ed445cfd1348a9abdcba6d3d10e06b8f06827
SHA2562b58f1637ce52445397f49acdc3e1f7cb0817a5d51af3d29b2049557f21bbd29
SHA512d92c7bdccad2b62deb671068c54030ab383b37fa9a7601e11ee8bbb39df3d8c22a05596b62a1caf6b9d0231aee065e6fbab37daee963290e4c5796b217373c29
-
Filesize
4KB
MD51e5a15db8d984d36c147f3675d85f919
SHA1104e0e0238f06b33c17c84ee477993ed157e29f8
SHA256e7d6e061220ff94eb2ea634b790f743dd6ae1c8d1c2e9299c4a76133f795c580
SHA51227740da55a798c01f2f3337f578c4fe8eb839147aeb1e61044782239649b37af25018a6e7f6d9f3ca399bd79c2cd4d8f81bf9839ed180b4e8264c454b4ba134c
-
Filesize
2KB
MD5776448ba80d4719b9f92a7c2a5b42373
SHA16f34561717e320b95dafca5f77808d0eeaa65d25
SHA25673a12385d0350cc7be53eb4d1aae485c27d25eb1356f8688be66f19063731f0c
SHA5121f11ff041716e8c74b4e9ccda4d6858e802a710e355f631600d0582a73250ed8bbc317d7dd19a9cd9c92baef12b7336cb9b8f9ff01f6c2364a550ce33f318529
-
Filesize
1KB
MD5022d183a4cb995b6c092de8757c2e9f5
SHA114d9ddf9b72debd52213a55ff4b4274bc84cd1cb
SHA256e62eb82169311450d735e39eb98345eea01f80cedd3ec3d62739a4e2dec974bf
SHA512af486babe6058ac528f1c4be65fe0d98436633cf0e45b13d27c7cd8c441b184f1a97128d1ea572e30ae03440990fc40594c848f863c428ea1d0cd1717b2bca37
-
Filesize
5KB
MD5d27a0b110c86b94798da09a6657c5f54
SHA15e7dd311dbd61c7f4ac279d83a352fdffa8177ab
SHA256c8802d23ba784f6a1fa7c95d1bb062ca7c070d2d4525f2653a39e2d7c23fe69e
SHA512427fd10aee9d9fd9493654141b30198f29b0fed4c2f0ebe97070c51007636272c5488f394f749bbdd704eadd5582d2c41c04521c6e62775a1e1af4b73332415c
-
Filesize
864B
MD5d875f1a73137688ee6d4c34801bd3239
SHA19846d0124a16626d0f6750d0697c27cb57742709
SHA2567d8bc4b527eaf68cff803362a5d026dccf1e3976e4b30c7fabe5d9b4a0663d91
SHA512cad07383a237c62cb3c1e238c91024f5c4af9ba65311c5610b9f71900d922c2f05ca81517c534a6a4cf10baf10dadaf5c3ffe2466baa0ef32b4432893cead405
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5674996775afa6d71c1634689fc499495
SHA1913f840bfe5782a0a5f6f3c46e77ab5fef6c4455
SHA2567eebe382d89bc4584ca57c833c2163db2e002c5d8a8444d1fad6176c88607db9
SHA512f8da924e1754deddc71b0b58cdb642e084802d1982d9a216b11c1640b8a2cf3c2f0dfdd0547ddbb637ba3b8e5e1c6d79695161024bb0467339796e4086085949
-
Filesize
11KB
MD5ae1661a9e22759ff7b8f60f3d0435708
SHA168e8307a0e0c27f2028ac07553a431c0eccb710d
SHA2562314c73469887ca806e4c742a22245b62ba9fcb27ef8185ce3a06ac8c1e2f6a2
SHA5125a0b69fba573eec4a268daeb833a4e8382025fe3041df758775a074e4acf801bfe82e1ed8d7e170fcbb5d998b65262c8ab638b3e323183b3b2be937480f446d3
-
Filesize
10KB
MD560650e7cef4703fcd7242bac5aa6eae4
SHA1a53d61666883c273526dabc5713b78d3607db69f
SHA256c0f644230fa9d3fe4f1dc8fcbd9872f0e5356956c926f95e732b91155de350e5
SHA5126540e7f7b24437aaf2e9c70c70bceb600b6b8d530b75605d9a05a954230723a5c1bc03eee7639fe23588fcdb16e52176e1573a26fe1d45e9441c49ba5b034ba0
-
Filesize
10KB
MD5165ceced84a2fcac5c9ffa7f51cecf0b
SHA1fbe57275959ea99c2264bc278b77ef23fc855d73
SHA256dcfc6ebf8de09e799fd88254eb97b5a78a58e45e8d13af5f61f3682e98d5fee7
SHA51207f23cb084b1031765252b4aebd8f035f77b400f6c8093907abcdeb7b6e6d430f240e78e57a8d983971371161fdfeca0ee825200de998dd5576f508d11967729
-
Filesize
11KB
MD5042079c460bb652b21635f2eb8d1d900
SHA12c67728799c48bc6f449c698923d2fa41653b772
SHA256f3b52e85278847a310699a7898df1d7096f2cece3a484a8b75d462a226434893
SHA5121774a9d29dd2a16efca8f028856e1f35633bd52e299d25765b1a7642362e1ada654db00bf9cb893dde858aebbc8eb498ac5f4fe1f50ce5752d5e3c35251db4ad
-
Filesize
11KB
MD55b4b8eb9693bd2a68dcbfb23f7a7c7cc
SHA1c77691db10197ff24aff90ac294f9d33132d20c1
SHA2561f48564f8f8a23df3fed9bf28cd7718ea0eaa6f4c659369e4ceac6eb08168bb9
SHA51266d97a7b8e9a7cfd889c1125873a7d917e0c0de6d9486e9ae4b3c8b142ecbaade0249260d3739d3cabe92b64025aa880b33c07a83f54cabfade94c5bee59bbec
-
Filesize
2KB
MD544551dfd693c81735b477ebcf9b632c6
SHA1b1eeef8a6513770c622bce58edddeb914c0e1a35
SHA256ea554a0d2f779a6ef4d29570428a3c6706a63af7d13c05319b15ad3f165e6741
SHA5128a2419a720a7c1ea08b7f262b040bc4c1136514f35046e594dd055f69e35c0235a4c6a9da6dcaab9387cd5a30113e3468d1466845fcf2475ef6a3c6e20a1078e
-
Filesize
5KB
MD50974e9f6495a4b1efa1e5a50acabe259
SHA19d3b261a76fa976b1a6be2262e51439579948426
SHA2561f38e99f4496f8973544f2d6163df6f2cf17d4a3dab0f7341c8d19e26b30677d
SHA5121e0dbdec13f8ec679e48d2c0966306a3589e8495be881ebc089f3b04b60dd0876c9fab9efcd03090419d657191603f4e63007db34369c886840309a49834748d
-
Filesize
2.3MB
MD5dfeea73e421c76deb18d5ca0800dccf2
SHA10497eba0b24d0f4500faad5ae96dbebab9c64608
SHA2568158dc0569972c10056f507cf9e72f4946600ce163c4c659a610480585cd4935
SHA51223ddc9f28314d4cf3b05d88b9e0b6fd69f9804f5e9c3f7703258ff2c5786721061321379fde53e21048d3c7cce1ff71e2872d48dcc580d059397fa0692335630
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
3.3MB
MD56c33b4937c5ed3f19f44cda1a9fe0bfc
SHA109ac5309b4d112d7cdb275572c28e3513748ad8c
SHA25654336cd4f4608903b1f89a43ca88f65c2f209f4512a5201cebd2b38ddc855f24
SHA512de2d46289164c77e7e5815d011164b48fe3e7394228a4ac2dd97b58a9ec68e306e7d18b18c45913fda9b80fed47607ea7600004e5fdffcda5b1362e71ad68056
-
Filesize
137B
MD5dcbbc85617779c24a30cd2f165fa439a
SHA19ee4f4ccccb691e26a16e1c1ae3f4ead0e2fc066
SHA256caddea56b0c9fb52cc0159a5e82bbb38de896da32d8cb63163cac2ee42cdf547
SHA5126caeee9b2438ea686f6abd51d4b19c9b37972ee8b146481f4ba026b3e32334bd708cb7bfb98296ba480698880b0f05779e26daca538565f5c6b55cb4dbff88ac
-
Filesize
16.2MB
MD5ddfc82cf4eab81965e3ec8ca8915b00a
SHA11e5b94be6922e6198afe39a7fc695db291bffcf6
SHA2564819d87fe9d0d0485fe85a3843a3e3ecd61ebe50a115dad01ec10275272be82a
SHA512ac08fa6aa1e55a653ad48305bf19c346d0a82a30830ae5b8c84d557e44c57511e39c68deb786044481074fb694d3827f66cb66862ac52fb4437663e82d64ba42
-
Filesize
414KB
MD5c850f942ccf6e45230169cc4bd9eb5c8
SHA151c647e2b150e781bd1910cac4061a2cee1daf89
SHA25686e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f
SHA5122b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9