Resubmissions
05/02/2025, 09:34
250205-lj3hzaskdm 102/02/2025, 14:19
250202-rmz5xavnfw 402/02/2025, 14:17
250202-rl3veavnc1 402/02/2025, 00:22
250202-an9bjaynfr 1002/02/2025, 00:12
250202-ahevqsylfm 1002/02/2025, 00:08
250202-ae1m2awpbt 1002/02/2025, 00:04
250202-acl2vsykbm 10Analysis
-
max time kernel
1800s -
max time network
1414s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02/02/2025, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
b231263f-0b92-4f02-9e71-3d6a05534490.jpg
Resource
win10ltsc2021-20250128-en
General
-
Target
b231263f-0b92-4f02-9e71-3d6a05534490.jpg
-
Size
26KB
-
MD5
99cfb36285d82796d745c8a199f6acff
-
SHA1
ab990d5b00d7878178a6e77553152149ce4f56c3
-
SHA256
afc3ff71d364c14eecc12918e7c00a435943005fc86dafa53da529f0a9c95285
-
SHA512
3a9558a9e628aac5af58f98a9e7056fe5a2741517067f0f9ebac9a800d6bd564433ab0b3910746f99e82573d2ba176241ce3d3b25961a6c27ae828c0d4defd26
-
SSDEEP
768:Z3Bt4w6U03dxH1/ARsjefQIbwTj5pW0JPfmXkD+lakhXOsX0:Z3BtNZAdxHdARkef7bQ5I8POEqY
Malware Config
Extracted
danabot
51.178.195.151
51.222.39.81
149.255.35.125
38.68.50.179
51.77.7.204
Signatures
-
Chimera 64 IoCs
Ransomware which infects local and network files, often distributed via Dropbox links.
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hr-hr\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-il\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-gb\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hu-hu\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\uk-ua\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\root\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\it-it\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-il\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\hu-hu\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\he-il\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\root\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\themes\dark\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-gb\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pl-pl\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\en-gb\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hu-hu\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pt-br\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\it-it\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\tr-tr\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sk-sk\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files\Microsoft Office\root\Integration\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pl-pl\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-cn\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\da-dk\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sk-sk\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-gb\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ru-ru\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files\Microsoft Office\root\vreg\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ca-es\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\da-dk\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hu-hu\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pt-br\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe -
Chimera Ransomware Loader DLL 1 IoCs
Drops/unpacks executable file which resembles Chimera's Loader.dll.
resource yara_rule behavioral1/memory/3896-2004-0x0000000010000000-0x0000000010010000-memory.dmp chimera_loader_dll -
Chimera family
-
Danabot family
-
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
resource yara_rule behavioral1/files/0x000d000000027eee-1530.dat family_danabot -
Renames multiple (3269) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 42 IoCs
flow pid Process 130 3412 rundll32.exe 138 3412 rundll32.exe 141 3412 rundll32.exe 142 3412 rundll32.exe 218 3412 rundll32.exe 223 3412 rundll32.exe 224 3412 rundll32.exe 225 3412 rundll32.exe 226 3412 rundll32.exe 255 3412 rundll32.exe 272 3412 rundll32.exe 301 3412 rundll32.exe 305 3412 rundll32.exe 310 3412 rundll32.exe 319 3412 rundll32.exe 320 3412 rundll32.exe 323 3412 rundll32.exe 363 3412 rundll32.exe 368 3412 rundll32.exe 369 3412 rundll32.exe 370 3412 rundll32.exe 371 3412 rundll32.exe 373 3412 rundll32.exe 374 3412 rundll32.exe 375 3412 rundll32.exe 376 3412 rundll32.exe 389 3412 rundll32.exe 390 3412 rundll32.exe 391 3412 rundll32.exe 392 3412 rundll32.exe 393 3412 rundll32.exe 394 3412 rundll32.exe 395 3412 rundll32.exe 396 3412 rundll32.exe 400 3412 rundll32.exe 401 3412 rundll32.exe 407 3412 rundll32.exe 408 3412 rundll32.exe 409 3412 rundll32.exe 410 3412 rundll32.exe 411 3412 rundll32.exe 413 3412 rundll32.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\132.0.2957.140\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file 8 IoCs
flow pid Process 384 4012 Process not Found 111 1640 msedge.exe 111 1640 msedge.exe 111 1640 msedge.exe 111 1640 msedge.exe 111 1640 msedge.exe 288 4516 IEXPLORE.EXE 303 1892 Process not Found -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Control Panel\International\Geo\Nation setup.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 44 IoCs
pid Process 6124 DanaBot.exe 4212 butterflyondesktop.exe 4960 butterflyondesktop.tmp 4552 ButterflyOnDesktop.exe 3896 HawkEye.exe 1488 AgentTesla.exe 4408 Trololo.exe 3380 MicrosoftEdgeSetup.exe 3672 MicrosoftEdgeUpdate.exe 3748 MicrosoftEdgeUpdate.exe 4844 MicrosoftEdgeUpdate.exe 3276 MicrosoftEdgeUpdateComRegisterShell64.exe 2108 MicrosoftEdgeUpdateComRegisterShell64.exe 3084 MicrosoftEdgeUpdateComRegisterShell64.exe 3036 MicrosoftEdgeUpdate.exe 3544 MicrosoftEdgeUpdate.exe 2548 MicrosoftEdgeUpdate.exe 4188 MicrosoftEdgeUpdate.exe 2752 MicrosoftEdge_X64_132.0.2957.140.exe 524 setup.exe 3888 setup.exe 3836 setup.exe 5728 setup.exe 5296 setup.exe 5604 setup.exe 4316 setup.exe 3792 setup.exe 3716 MicrosoftEdgeUpdate.exe 5960 MicrosoftEdgeUpdate.exe 3856 MicrosoftEdgeUpdate.exe 4832 MicrosoftEdgeUpdate.exe 5688 elevation_service.exe 2844 setup.exe 5272 setup.exe 3252 setup.exe 5388 setup.exe 4408 setup.exe 5396 setup.exe 5164 MicrosoftEdge_X64_132.0.2957.127.exe 2188 setup.exe 2316 setup.exe 1664 MicrosoftEdgeUpdate.exe 4556 MicrosoftEdgeUpdate.exe 2352 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 29 IoCs
pid Process 4556 regsvr32.exe 4556 regsvr32.exe 3412 rundll32.exe 3412 rundll32.exe 3672 MicrosoftEdgeUpdate.exe 3748 MicrosoftEdgeUpdate.exe 4844 MicrosoftEdgeUpdate.exe 3276 MicrosoftEdgeUpdateComRegisterShell64.exe 4844 MicrosoftEdgeUpdate.exe 2108 MicrosoftEdgeUpdateComRegisterShell64.exe 4844 MicrosoftEdgeUpdate.exe 3084 MicrosoftEdgeUpdateComRegisterShell64.exe 4844 MicrosoftEdgeUpdate.exe 3036 MicrosoftEdgeUpdate.exe 3544 MicrosoftEdgeUpdate.exe 2548 MicrosoftEdgeUpdate.exe 2548 MicrosoftEdgeUpdate.exe 3544 MicrosoftEdgeUpdate.exe 4188 MicrosoftEdgeUpdate.exe 3716 MicrosoftEdgeUpdate.exe 5960 MicrosoftEdgeUpdate.exe 3856 MicrosoftEdgeUpdate.exe 3856 MicrosoftEdgeUpdate.exe 5960 MicrosoftEdgeUpdate.exe 4832 MicrosoftEdgeUpdate.exe 1664 MicrosoftEdgeUpdate.exe 4556 MicrosoftEdgeUpdate.exe 4556 MicrosoftEdgeUpdate.exe 2352 MicrosoftEdgeUpdate.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ButterflyOnDesktop butterflyondesktop.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 25 IoCs
description ioc Process File opened for modification C:\Users\Public\AccountPictures\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Documents\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Links\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Music\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Searches\desktop.ini rundll32.exe File opened for modification C:\Users\Public\Desktop\desktop.ini rundll32.exe File opened for modification C:\Program Files (x86)\desktop.ini rundll32.exe File opened for modification C:\Users\Public\Libraries\desktop.ini rundll32.exe File opened for modification C:\Users\Public\Pictures\desktop.ini rundll32.exe File opened for modification C:\Users\Public\Documents\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Videos\desktop.ini rundll32.exe File opened for modification C:\Users\Public\Downloads\desktop.ini rundll32.exe File opened for modification C:\Users\Public\desktop.ini rundll32.exe File opened for modification C:\Program Files\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini rundll32.exe File opened for modification C:\Users\Public\Music\desktop.ini rundll32.exe File opened for modification C:\Users\Public\Videos\desktop.ini rundll32.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini rundll32.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 102 raw.githubusercontent.com 103 camo.githubusercontent.com 111 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 222 bot.whatismyipaddress.com -
Checks system information in the registry 2 TTPs 22 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 1244 tasklist.exe 3776 tasklist.exe 6036 tasklist.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ru-ru\ui-strings.js rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ja-jp\ui-strings.js rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-100.png rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Edge.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\Trust Protection Lists\Sigma\Social setup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\rhp\combinepdf-tool-view.js rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\hr-hr\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Locales\is.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-cn\ui-strings.js rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Violet.xml rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\ui-strings.js rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\sunmscapi.jar rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\sl_get.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hu-hu\ui-strings.js rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\bg_pattern_RHP.png rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\Locales\kn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\identity_proxy\win11\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-white_scale-140.png rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sql90.xsl rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\new_icons.png rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\images\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\Trust Protection Lists\Mu\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\Locales\sq.pak setup.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-80.png rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\it-it\ui-strings.js rundll32.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\prefs_enclave_x64.dll setup.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\office.core.operational.js rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\spectrum_spinner.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\cs-cz\ui-strings.js rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\README_en_CA.txt rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\pt-br\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\ja-jp\ui-strings.js rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\msedge_wer.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\identity_proxy\win11\identity_helper.Sparse.Beta.msix setup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\rhp\combinepdf-selector.js rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_pl_135x40.svg rundll32.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png rundll32.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ko-kr\ui-strings.js rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\plugin.js rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nb-no\ui-strings.js rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Locales\pl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\notification_helper.exe setup.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\da-dk\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Unlock.png rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\dxil.dll setup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\edit_pdf_poster2x.jpg rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\tr-tr\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\Trust Protection Lists\Mu\Fingerprinting setup.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\telclient.dll setup.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\uk-ua\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ko-kr\ui-strings.js rundll32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sk-sk\YOUR_FILES_ARE_ENCRYPTED.HTML rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\plugin.js rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\tool-search.png rundll32.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC527.tmp\msedgeupdateres_mt.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.127\Installer\setup.exe setup.exe -
Drops file in Windows directory 59 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4516 6124 WerFault.exe 138 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AgentTesla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language butterflyondesktop.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ButterflyOnDesktop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DanaBot.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4832 MicrosoftEdgeUpdate.exe 1664 MicrosoftEdgeUpdate.exe 2352 MicrosoftEdgeUpdate.exe 3036 MicrosoftEdgeUpdate.exe 4188 MicrosoftEdgeUpdate.exe 3716 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz iexplore.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Taskmgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString iexplore.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DiagnosticsHub.StandardCollector.Service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz DiagnosticsHub.StandardCollector.Service.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Taskmgr.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU iexplore.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe -
Kills process with taskkill 34 IoCs
pid Process 884 taskkill.exe 5024 taskkill.exe 2220 taskkill.exe 5416 taskkill.exe 2872 taskkill.exe 1408 taskkill.exe 2112 taskkill.exe 60 taskkill.exe 3508 taskkill.exe 2580 taskkill.exe 1168 taskkill.exe 5736 taskkill.exe 3712 taskkill.exe 5432 taskkill.exe 5688 taskkill.exe 5588 taskkill.exe 1696 taskkill.exe 4424 taskkill.exe 1252 taskkill.exe 6004 taskkill.exe 3584 taskkill.exe 2984 taskkill.exe 2060 taskkill.exe 224 taskkill.exe 4580 taskkill.exe 5152 taskkill.exe 2188 taskkill.exe 4560 taskkill.exe 4356 taskkill.exe 1940 taskkill.exe 3992 taskkill.exe 4500 taskkill.exe 4424 taskkill.exe 5292 taskkill.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 10fbb66bac71db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2214503482" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\bing.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "65" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31159561" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\DOMStorage\bing.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.bing.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\132.0.2957.140\\BHO" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.4355\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 904a67800975db01 iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9008d4c30975db01 iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.bing.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000064cec9bcb2cf034581d4b0071d9a4d050000000002000000000010660000000100002000000043d323bc5d7e05e6c23f97ccd3b51148996cb40f3dcb5a7ecefd27f49ef3fb41000000000e80000000020000200000000c325ae02e8cedb8285cff20f81fbf9093448561c2074e419ee2afcfc48e5c7c20000000ce75080bd385ea2d5ba5c9da15135860e75dfd6d3d066d8dfe4eb6c041faa95a40000000e34d98660d7c1470f4940e01de817ff67b7bca4f3fbda8daa2e9d473828d458643f1776d7eac924f84a8a93ae8c79b0ad0b704b18c7e4115cb914034dc30dd45 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5092dc7b0975db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\mega.nz\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\mega.nz\Total = "65" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000000700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009acbbc286be63c4682a409f320de94d7 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407c6eba0975db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\Main\SuppressScriptDebuggerDialog = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000064cec9bcb2cf034581d4b0071d9a4d05000000000200000000001066000000010000200000004c15cf30cc25c98f25c642fc59d113223c2d4fe751781c6e1be15172dd2b6c38000000000e8000000002000020000000e2b632c4861455c4d1ea2c2b97e2ef655ceee19b545951d0930cf0bfe52dc321200000009d979124fab6c16d463c359b6fb124badde22f73405e73505c298ee5940d8808400000008f80e0150befa0b02b57cf596f96b3a2d515e9e23ec4b3e9e2978fa305aeaa9c4ba4559717c3e7e01515891abe834d7c90bf8056b25dbbabe4a8a1a22b52c5c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31159561" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "445221110" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\TypedURLs Taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31159561" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2433113463" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{AF9A9F86-E0FC-11EF-BBA3-EED681A9FE7B} = "0" iexplore.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Owner = b40c00007390173f0a75db01 setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Sequence = "1" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 4360f3fed70f48ad8400e9337ce4fc9df8c1fe6c246fd2b303f9343e384c2794 setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 70abc42f55820f593cbc2c46d18c295172358d5c50fc9aa69d2198366b32f198 setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A0B482A5-71D4-4395-857C-1F3B57FB8809}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000_Classes\Local Settings msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ = "IGoogleUpdate" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0\CLSID\ = "{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ = "ServiceModule" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ = "IRegistrationUpdateHook" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A0B482A5-71D4-4395-857C-1F3B57FB8809} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" NOTEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.Update3WebMachine" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ = "IApp2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachineFallback\ = "Microsoft Edge Update Update3Web" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3COMClassService\ = "Update3COMClass" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{41E1FADF-C62D-4DF4-A0A2-A3BEB272D8AF}\InprocHandler32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ = "IPolicyStatus3" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachine\CurVer\ = "MicrosoftEdgeUpdate.PolicyStatusMachine.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pdf\OpenWithProgids\MSEdgePDF setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{41E1FADF-C62D-4DF4-A0A2-A3BEB272D8AF}\InprocHandler32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.43\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{41E1FADF-C62D-4DF4-A0A2-A3BEB272D8AF}\InprocHandler32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" NOTEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ = "IApp" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachine\CLSID\ = "{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.Update3WebMachineFallback" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-21-2994328021-2832906384-2448483822-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Mode = "6" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\ = "IPolicyStatus5" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\runas\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --do-not-de-elevate --single-argument %1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\ = "ICredentialDialog" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32\ = "{A0B482A5-71D4-4395-857C-1F3B57FB8809}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}\ProgID\ = "MicrosoftEdgeUpdate.PolicyStatusSvc.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{41E1FADF-C62D-4DF4-A0A2-A3BEB272D8AF}\InprocHandler32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\runas\ProgrammaticAccessOnly setup.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A} MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods\ = "43" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} setup.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 707044.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 239131.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 483338.crdownload:SmartScreen msedge.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 3020 NOTEPAD.EXE 3908 NOTEPAD.EXE 2340 NOTEPAD.EXE -
Runs regedit.exe 2 IoCs
pid Process 3200 regedit.exe 3784 regedit.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 3928 explorer.exe 4568 explorer.exe 3484 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5388 mspaint.exe 5388 mspaint.exe 1640 msedge.exe 1640 msedge.exe 1128 msedge.exe 1128 msedge.exe 5720 identity_helper.exe 5720 identity_helper.exe 4504 msedge.exe 4504 msedge.exe 5564 msedge.exe 5564 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4692 msedge.exe 4692 msedge.exe 4500 msedge.exe 4500 msedge.exe 3020 msedge.exe 3020 msedge.exe 5612 msedge.exe 5612 msedge.exe 4744 msedge.exe 4744 msedge.exe 3672 MicrosoftEdgeUpdate.exe 3672 MicrosoftEdgeUpdate.exe 5716 DiagnosticsHub.StandardCollector.Service.exe 5716 DiagnosticsHub.StandardCollector.Service.exe 3672 MicrosoftEdgeUpdate.exe 3672 MicrosoftEdgeUpdate.exe 3672 MicrosoftEdgeUpdate.exe 3672 MicrosoftEdgeUpdate.exe 5960 MicrosoftEdgeUpdate.exe 5960 MicrosoftEdgeUpdate.exe 5960 MicrosoftEdgeUpdate.exe 5960 MicrosoftEdgeUpdate.exe 5388 setup.exe 5388 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 3252 setup.exe 4556 MicrosoftEdgeUpdate.exe 4556 MicrosoftEdgeUpdate.exe 1940 Taskmgr.exe 1940 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 5040 iexplore.exe 2292 IEXPLORE.EXE 2340 NOTEPAD.EXE 3200 regedit.exe 1940 Taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 32 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 3896 HawkEye.exe Token: SeDebugPrivilege 2060 taskkill.exe Token: SeDebugPrivilege 3508 taskkill.exe Token: 33 3392 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3392 AUDIODG.EXE Token: SeDebugPrivilege 3672 MicrosoftEdgeUpdate.exe Token: SeSystemProfilePrivilege 5716 DiagnosticsHub.StandardCollector.Service.exe Token: SeDebugPrivilege 3672 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 1244 tasklist.exe Token: SeDebugPrivilege 5960 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 224 taskkill.exe Token: SeDebugPrivilege 5432 taskkill.exe Token: SeDebugPrivilege 2580 taskkill.exe Token: SeDebugPrivilege 5688 taskkill.exe Token: SeDebugPrivilege 4580 taskkill.exe Token: SeDebugPrivilege 5588 taskkill.exe Token: SeDebugPrivilege 1696 taskkill.exe Token: SeDebugPrivilege 4560 taskkill.exe Token: SeDebugPrivilege 3992 taskkill.exe Token: SeDebugPrivilege 4356 taskkill.exe Token: SeDebugPrivilege 5736 taskkill.exe Token: SeDebugPrivilege 884 taskkill.exe Token: SeDebugPrivilege 5152 taskkill.exe Token: SeDebugPrivilege 4424 taskkill.exe Token: SeDebugPrivilege 4500 taskkill.exe Token: SeDebugPrivilege 3584 taskkill.exe Token: SeDebugPrivilege 2188 taskkill.exe Token: SeDebugPrivilege 5024 taskkill.exe Token: SeDebugPrivilege 4424 taskkill.exe Token: 33 2188 setup.exe Token: SeIncBasePriorityPrivilege 2188 setup.exe Token: SeDebugPrivilege 5416 taskkill.exe Token: SeDebugPrivilege 4556 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 3776 tasklist.exe Token: SeDebugPrivilege 2984 taskkill.exe Token: SeDebugPrivilege 3712 taskkill.exe Token: SeDebugPrivilege 1408 taskkill.exe Token: SeDebugPrivilege 5292 taskkill.exe Token: SeDebugPrivilege 2112 taskkill.exe Token: SeDebugPrivilege 6004 taskkill.exe Token: SeDebugPrivilege 6036 tasklist.exe Token: SeDebugPrivilege 2872 taskkill.exe Token: SeDebugPrivilege 60 taskkill.exe Token: SeDebugPrivilege 1940 Taskmgr.exe Token: SeSystemProfilePrivilege 1940 Taskmgr.exe Token: SeCreateGlobalPrivilege 1940 Taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 4960 butterflyondesktop.tmp 4552 ButterflyOnDesktop.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 4552 ButterflyOnDesktop.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
pid Process 5388 mspaint.exe 5388 mspaint.exe 5388 mspaint.exe 5388 mspaint.exe 5040 iexplore.exe 5040 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 5040 iexplore.exe 5040 iexplore.exe 4516 IEXPLORE.EXE 4516 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 5040 iexplore.exe 5040 iexplore.exe 4416 IEXPLORE.EXE 4416 IEXPLORE.EXE 4416 IEXPLORE.EXE 4416 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 5040 iexplore.exe 5040 iexplore.exe 6048 IEXPLORE.EXE 6048 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2340 NOTEPAD.EXE 2340 NOTEPAD.EXE 2340 NOTEPAD.EXE 3928 explorer.exe 3928 explorer.exe 4568 explorer.exe 4568 explorer.exe 3484 explorer.exe 3484 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1128 wrote to memory of 3756 1128 msedge.exe 88 PID 1128 wrote to memory of 3756 1128 msedge.exe 88 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1692 1128 msedge.exe 89 PID 1128 wrote to memory of 1640 1128 msedge.exe 90 PID 1128 wrote to memory of 1640 1128 msedge.exe 90 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 PID 1128 wrote to memory of 1436 1128 msedge.exe 91 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\b231263f-0b92-4f02-9e71-3d6a05534490.jpg"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7fff00d846f8,0x7fff00d84708,0x7fff00d847182⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1920 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6328 /prefetch:82⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6740 /prefetch:12⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1368 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6792 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7536 /prefetch:12⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1320 /prefetch:12⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7900 /prefetch:82⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Users\Admin\Downloads\DanaBot.exe"C:\Users\Admin\Downloads\DanaBot.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6124 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\DOWNLO~1\DanaBot.dll f1 C:\Users\Admin\DOWNLO~1\DanaBot.exe@61243⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4556 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\DOWNLO~1\DanaBot.dll,f04⤵
- Chimera
- Blocklisted process makes network request
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3412 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"5⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5040 CREDAT:17410 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2292 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122887⤵PID:4852
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\wadsdwas.txt7⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Opens file in notepad (likely ransom note)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Downloads\anda.bat8⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\anda.bat"8⤵
- System Location Discovery: System Language Discovery
PID:5972 -
C:\Windows\SysWOW64\cmd.execmd.exe9⤵PID:6076
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe10⤵
- System Location Discovery: System Language Discovery
PID:1240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe10⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe10⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5416
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe10⤵
- System Location Discovery: System Language Discovery
PID:5984
-
-
C:\Windows\SysWOW64\Taskmgr.exetaskmgr.exe10⤵
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Windows\SysWOW64\user.exeuser10⤵PID:2752
-
-
C:\Windows\SysWOW64\user.exeuser `10⤵PID:4416
-
-
C:\Windows\SysWOW64\user.exeuser Admin10⤵PID:2640
-
-
C:\Windows\SysWOW64\help.exehelp10⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
C:\Windows\SysWOW64\help.exehelp 210⤵PID:3860
-
-
C:\Windows\SysWOW64\help.exehelp /?10⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-
C:\Windows\SysWOW64\help.exeHelp10⤵
- System Location Discovery: System Language Discovery
PID:1148
-
-
C:\Windows\SysWOW64\cmd.execmd10⤵
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd.exe11⤵
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd.exe12⤵
- System Location Discovery: System Language Discovery
PID:3292
-
-
-
C:\Windows\SysWOW64\tasklist.exetasklist11⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe11⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe11⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe11⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe11⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe11⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe11⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6004
-
-
C:\Windows\SysWOW64\tasklist.exetasklist11⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6036
-
-
C:\Windows\SysWOW64\cmd.execmd.exe11⤵
- System Location Discovery: System Language Discovery
PID:5160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM rundll32.exe11⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ButterflyOnDesktop.exe11⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe11⤵
- System Location Discovery: System Language Discovery
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
PID:3200
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe11⤵
- System Location Discovery: System Language Discovery
- Runs regedit.exe
PID:3784
-
-
C:\Windows\SysWOW64\Taskmgr.exetaskmgr.exe11⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"12⤵
- System Location Discovery: System Language Discovery
PID:3372
-
-
-
-
-
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Trololo.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM iexplore.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM iexplore.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM iexplore.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM splwow64.exe9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM9⤵
- Kills process with taskkill
PID:1252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2220
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Downloads\anda.bat8⤵
- Opens file in notepad (likely ransom note)
PID:3908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\anda.bat"8⤵
- System Location Discovery: System Language Discovery
PID:4744 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM setup.exe9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Trololo.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM iexplore.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM iexplore.exe9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM iexplore.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM splwow64.exe9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM9⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM9⤵
- Kills process with taskkill
PID:1940
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5040 CREDAT:17416 /prefetch:26⤵
- Downloads MZ/PE file
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4516
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UT3050KB\MicrosoftEdgeSetup.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UT3050KB\MicrosoftEdgeSetup.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3380 -
C:\Program Files (x86)\Microsoft\Temp\EUC527.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUC527.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}&appname=Microsoft%20Edge&needsadmin=prefers&usagestats=0"7⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3748
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4844 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3276
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2108
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3084
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDQuNDUyOSIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjEyNSIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjQzIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI4ODIyMDU3NDYwIiBpbnN0YWxsX3RpbWVfbXM9IjQzNyIvPjwvYXBwPjwvcmVxdWVzdD48⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Network Configuration Discovery: Internet Connection Discovery
PID:3036
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}&appname=Microsoft%20Edge&needsadmin=prefers&usagestats=0" /installsource taggedmi /sessionid "{5ADCD89C-C93D-48DA-BECC-8F10D7E10A4E}"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3544
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5040 CREDAT:82950 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4416
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:5040 CREDAT:82956 /prefetch:26⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2208
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5040 CREDAT:82960 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:6048
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 4723⤵
- Program crash
PID:4516
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6348 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8008 /prefetch:82⤵PID:3384
-
-
C:\Users\Admin\Downloads\butterflyondesktop.exe"C:\Users\Admin\Downloads\butterflyondesktop.exe"2⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\is-0V54S.tmp\butterflyondesktop.tmp"C:\Users\Admin\AppData\Local\Temp\is-0V54S.tmp\butterflyondesktop.tmp" /SL5="$802DA,2719719,54272,C:\Users\Admin\Downloads\butterflyondesktop.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:4960 -
C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://freedesktopsoft.com/butterflyondesktoplike.html4⤵PID:3064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7fff00d846f8,0x7fff00d84708,0x7fff00d847185⤵PID:892
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7880 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7900 /prefetch:12⤵PID:5936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8120 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7608 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6232 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8164 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6648 /prefetch:82⤵PID:5940
-
-
C:\Users\Admin\Downloads\HawkEye.exe"C:\Users\Admin\Downloads\HawkEye.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3232 /prefetch:82⤵PID:5908
-
-
C:\Users\Admin\Downloads\AgentTesla.exe"C:\Users\Admin\Downloads\AgentTesla.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7580 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,17785015814521376412,13549657431895396807,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8372 /prefetch:82⤵PID:5180
-
-
C:\Users\Admin\Downloads\Trololo.exe"C:\Users\Admin\Downloads\Trololo.exe"2⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SYSTEM32\taskkill.exetaskkill.exe /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill.exe /f /im taskmgr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1476
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3e4 0x3ec1⤵PID:3388
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 6124 -ip 61241⤵PID:2220
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3e4 0x3ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:4588
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2548 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4188
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\MicrosoftEdge_X64_132.0.2957.140.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
PID:2752 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\EDGEMITMP_99B35.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\EDGEMITMP_99B35.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
PID:524 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\EDGEMITMP_99B35.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\EDGEMITMP_99B35.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\EDGEMITMP_99B35.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x240,0x244,0x248,0x21c,0x24c,0x7ff71fe0a818,0x7ff71fe0a824,0x7ff71fe0a8304⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3888
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\EDGEMITMP_99B35.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\EDGEMITMP_99B35.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3836 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\EDGEMITMP_99B35.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\EDGEMITMP_99B35.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{7F145ED1-F38B-4BC3-8AAF-24B395BF0E6B}\EDGEMITMP_99B35.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x240,0x244,0x248,0x21c,0x24c,0x7ff71fe0a818,0x7ff71fe0a824,0x7ff71fe0a8305⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5728
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5604 -
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6bc89a818,0x7ff6bc89a824,0x7ff6bc89a8305⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3792
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5296 -
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x240,0x244,0x248,0x21c,0x24c,0x7ff6bc89a818,0x7ff6bc89a824,0x7ff6bc89a8305⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4316
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDQuNDUyOSIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjEyNSIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-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-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-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iOTE5MTQ4NzQ1NCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjYiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjkyMDcyMTc0NDIiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIxOTY3NTciIHN5c3RlbV91cHRpbWVfdGlja3M9Ijk4NTY1Mjg0MTUiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSIyNjgiIGRvd25sb2FkX3RpbWVfbXM9IjM2MDg5IiBkb3dubG9hZGVkPSIxNzcxODAyMTYiIHRvdGFsPSIxNzcxODAyMTYiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjY0OTI0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Network Configuration Discovery: Internet Connection Discovery
PID:3716
-
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2452
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵PID:6008
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5960
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3856 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "3856" "1064" "996" "1068" "0" "0" "0" "0" "0" "0" "0" "0"2⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2088
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjVBMTc1ODgtMzE4RC00MjMwLUE1MTktOTRFRTk5ODgxRkZFfSIgdXNlcmlkPSJ7RTk1Q0U1NjUtQTU3Ri00NDFELUI4Q0YtM0M3QTYyMTJENkYzfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InsyMjUxNTBGMi01MkQ5LTRBQzItQTAwNy0yMTIyQzQ4OUYxMTV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQ0LjQ1MjkiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxMjUiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjEzMi4wLjI5NTcuMTQwIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjMiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExODIzMzA3ODkzIi8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4832
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01F3161-B0B7-4F9D-810E-D6E7938A728F}\MicrosoftEdge_X64_132.0.2957.127.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01F3161-B0B7-4F9D-810E-D6E7938A728F}\MicrosoftEdge_X64_132.0.2957.127.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:5164 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01F3161-B0B7-4F9D-810E-D6E7938A728F}\EDGEMITMP_EB0CB.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01F3161-B0B7-4F9D-810E-D6E7938A728F}\EDGEMITMP_EB0CB.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01F3161-B0B7-4F9D-810E-D6E7938A728F}\MicrosoftEdge_X64_132.0.2957.127.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01F3161-B0B7-4F9D-810E-D6E7938A728F}\EDGEMITMP_EB0CB.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01F3161-B0B7-4F9D-810E-D6E7938A728F}\EDGEMITMP_EB0CB.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.111 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E01F3161-B0B7-4F9D-810E-D6E7938A728F}\EDGEMITMP_EB0CB.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6ad9aa818,0x7ff6ad9aa824,0x7ff6ad9aa8304⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2316
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjVBMTc1ODgtMzE4RC00MjMwLUE1MTktOTRFRTk5ODgxRkZFfSIgdXNlcmlkPSJ7RTk1Q0U1NjUtQTU3Ri00NDFELUI4Q0YtM0M3QTYyMTJENkYzfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InsyNjZGODgyOC03OUZFLTQ4QzgtQTEzRi01NkJBMTI2ODIzMkR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQ0LjQ1MjkiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxMjUiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEzMi4wLjI5NTcuMTI3IiBsYW5nPSIiIGJyYW5kPSJFVVdWIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iOSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTE4MzI2ODc4MjgiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI1IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMTgzMjcxNzkzNCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIwIiBlcnJvcmNvZGU9Ii0yMTQ3MDIzODM4IiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMjI1MDYwODE0NiIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iZG8iIHVybD0iaHR0cDovL21zZWRnZS5iLnRsdS5kbC5kZWxpdmVyeS5tcC5taWNyb3NvZnQuY29tL2ZpbGVzdHJlYW1pbmdzZXJ2aWNlL2ZpbGVzLzJiMTE4YTMxLWNjYmUtNGQ1Zi1iYTQyLTM3M2FjMzMzNjFhYj9QMT0xNzM5MDYxMjY5JmFtcDtQMj00MDQmYW1wO1AzPTImYW1wO1A0PUx3S09aNTVGYUY0VCUyYmhlQiUyZk1xajNkOHA5JTJieG00WmtYaUlIWVFMaGNxclZPVHhNUGhBUmZYbnRZSzZZdlZpUEhXRWg1MW1WdmtNbkFCSTEzTnNLRUJ3JTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMCIgdG90YWw9IjAiIGRvd25sb2FkX3RpbWVfbXM9IjIiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMjI1MDYwODE0NiIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iYml0cyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvMmIxMThhMzEtY2NiZS00ZDVmLWJhNDItMzczYWMzMzM2MWFiP1AxPTE3MzkwNjEyNjkmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9THdLT1o1NUZhRjRUJTJiaGVCJTJmTXFqM2Q4cDklMmJ4bTRaa1hpSUhZUUxoY3FyVk9UeE1QaEFSZlhudFlLNll2VmlQSFdFaDUxbVZ2a01uQUJJMTNOc0tFQnclM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIxNzcwNzgzNTIiIHRvdGFsPSIxNzcwNzgzNTIiIGRvd25sb2FkX3RpbWVfbXM9IjM1NzA4Ii8-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTIyNTEyMzMxMTYiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI2IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMjI2NDY3Mjg4OSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5Njc1NyIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTI4ODA2MTk5MzQiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSI2MDIiIGRvd25sb2FkX3RpbWVfbXM9IjQxODI4IiBkb3dubG9hZGVkPSIxNzcwNzgzNTIiIHRvdGFsPSIxNzcwNzgzNTIiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjYxNTYzIi8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\elevation_service.exe"1⤵
- Executes dropped EXE
PID:5688 -
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --rename-msedge-exe --system-level --verbose-logging --msedge --channel=stable2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2844 -
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x2a8,0x2ac,0x2b0,0x284,0x2b4,0x7ff6bc89a818,0x7ff6bc89a824,0x7ff6bc89a8303⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --delete-old-versions --system-level --verbose-logging3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x1ac,0x1a4,0x1a0,0x160,0x19c,0x7ff6bc89a818,0x7ff6bc89a824,0x7ff6bc89a8304⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4408
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:5388 -
C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6bc89a818,0x7ff6bc89a824,0x7ff6bc89a8304⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5396
-
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3376
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3928
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4568
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MjI5QjJCQjUtM0VGRi00NzBFLUI2QTAtODkyM0JGMTA5RjczfSIgdXNlcmlkPSJ7RTk1Q0U1NjUtQTU3Ri00NDFELUI4Q0YtM0M3QTYyMTJENkYzfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins3NDhDNUQ3MC00N0Y4LTQ0RjItQjdDQS00QTEzNDZBMUIwODB9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQ0LjQ1MjkiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxMjUiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-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-PHBpbmcgYWN0aXZlPSIwIiByPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0iezQ0NkVBNDc5LUUyRkUtNDE1RC04NTBELUIwODVGNjU1RjAxM30iLz48L2FwcD48YXBwIGFwcGlkPSJ7RjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1fSIgdmVyc2lvbj0iMTMyLjAuMjk1Ny4xMjciIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IkVVV1YiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZT0iNjYwMSIgY29ob3J0PSJycmZAMC4xMCI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0iezQ4RjVGMTE3LTNEQ0UtNDM3MC04OTgwLUFCQUZDNENGMEJBNH0iLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2352
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3484
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:5984
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵PID:1980
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1712
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
7System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD581aab57e0ef37ddff02d0106ced6b91e
SHA16e3895b350ef1545902bd23e7162dfce4c64e029
SHA256a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287
SHA512a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717
-
Filesize
2KB
MD5302016f790fecb79d1a347ff953d1b01
SHA122e9ae089ef9268a809d42ee508ab48ee2b3cdc0
SHA256947d14e7e3a5a27b34863e6febaeb036690bf60c075f858fb0e45949840656e4
SHA512581cf3a15783670d931dc6d477ccb0943b990f27d6d33d2db5c9a35f3dc43669ddee87fae266578899738b77c40926175876a5260e7a4fe1593b303e461a4ee5
-
C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\99b05669-0daa-4638-96de-153eabccc3b6.tmp
Filesize344B
MD51b7cdddfb06152ae01f12d9f253237d6
SHA11ef358781a086a0727f4fa95cd53510eb328bc52
SHA256fd668d6edcf6b6cc176edd9bf7b0d7f1881fe2f0d94ebae656127c27a359550e
SHA5124705c93b233be92dd2d04649d404b538bc76607bbe655d5e35a739653ac1af776ecdd12ec1cbf81476070ec5bae633f891817155014730a06939efb21bd132ea
-
Filesize
4KB
MD5d714c2af9a4bddf1bc09e18f46142dfd
SHA11e525d1f4cf21781c218073d4897cb3daa388c44
SHA256d956a3ab1a648f865f3d36f9066572f21280df8289264991b8eff2410e318111
SHA5123e737b959f87f1ad971716cc254226a49e44ddfa51da8ad339f757138012ce4c93ec3b3de5449b09bc50415e3eb1ec90beecad5a964d03a002cdb57a9fac45b0
-
Filesize
77KB
MD50d56a90f826b6aea72f3deda1ba3bbeb
SHA1b62c8354c9f960f12ce84d6cd89630429f70443b
SHA25695965b3b147d1f9b004e6afe46d2101abb912fb6c60f91a82c7c62536b7bf5a6
SHA51226837c99bc5eec435ae612ad152f895d41cf4b691d9323e8e16deba1cec07229f878158035d96e2960eb2162c8c5313fbd59a4cadaf7524b0335fa19dc18f523
-
Filesize
1024KB
MD58661d1368ea0e188da08dff2b7ba1863
SHA1513836f48eb6b9218f2b0eb85ede1a8592766446
SHA2561f25d1623632172b388b01185c183ff616b2908c7f8bc2f975355a5a8caf9c73
SHA51276cae2e79a0f44f9c82939157f12fc203f3f048469b2d0f2428eea87ddd3f3424a180959130f9db4196a100ba5cc8a2e5dca2703cdc377a67ef68541411738d1
-
Filesize
152B
MD555708ea6a193823c5162db60a9f7396d
SHA1cc48e8644d8a1c4588af35d319a477e6457416dd
SHA2562e00fc9c4ec5aa772eb34ec24bd92e66b23a5100789a7d7d05b97344bc0c45c9
SHA512fb5fabcd0341d2c7af481cba196cacd4ef577ec356d92e8623646fddf3a51badcce19a261c7df3e705af6aa790a56e64d73888a6e8cd508b87c3d341fde8f690
-
Filesize
48KB
MD5df1d27ed34798e62c1b48fb4d5aa4904
SHA12e1052b9d649a404cbf8152c47b85c6bc5edc0c9
SHA256c344508bd16c376f827cf568ef936ad2517174d72bf7154f8b781a621250cc86
SHA512411311be9bfdf7a890adc15fe89e6f363bc083a186bb9bcb02be13afb60df7ebb545d484c597b5eecdbfb2f86cd246c21678209aa61be3631f983c60e5d5ca94
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
70KB
MD53b06aa689e8bf1aed00d923a55cfdd49
SHA1ca186701396ba24d747438e6de95397ed5014361
SHA256cd1569510154d7fa83732ccf69e41e833421f4e5ec7f70a5353ad07940ec445c
SHA5120422b94ec68439a172281605264dede7b987804b3acfdeeb86ca7b12249e0bd90e8e625f9549a9635165034b089d59861260bedf7676f9fa68c5b332123035ed
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
63KB
MD5226541550a51911c375216f718493f65
SHA1f6e608468401f9384cabdef45ca19e2afacc84bd
SHA256caecff4179910ce0ff470f9fa9eb4349e8fb717fa1432cf19987450a4e1ef4a5
SHA5122947b309f15e0e321beb9506861883fde8391c6f6140178c7e6ee7750d6418266360c335477cae0b067a6a6d86935ec5f7acdfdacc9edffa8b04ec71be210516
-
Filesize
25KB
MD5e580283a2015072bac6b880355fe117e
SHA10c0f3ca89e1a9da80cd5f536130ce5da3ad64bfe
SHA256be8b1b612f207b673b1b031a7c67f8e2421d57a305bebf11d94f1c6e47d569ee
SHA51265903ba8657d145cc3bbe37f5688b803ee03dd8ff8da23b587f64acaa793eaea52fcb6e8c0ec5032e0e3a2faacc917406ada179706182ce757d1c02979986dd6
-
Filesize
40KB
MD53051c1e179d84292d3f84a1a0a112c80
SHA1c11a63236373abfe574f2935a0e7024688b71ccb
SHA256992cbdc768319cbd64c1ec740134deccbb990d29d7dccd5ecd5c49672fa98ea3
SHA512df64e0f8c59b50bcffb523b6eab8fabf5f0c5c3d1abbfc6aa4831b4f6ce008320c66121dcedd124533867a9d5de83c424c5e9390bf0a95c8e641af6de74dabff
-
Filesize
53KB
MD568f0a51fa86985999964ee43de12cdd5
SHA1bbfc7666be00c560b7394fa0b82b864237a99d8c
SHA256f230c691e1525fac0191e2f4a1db36046306eb7d19808b7bf8227b7ed75e5a0f
SHA5123049b9bd4160bfa702f2e2b6c1714c960d2c422e3481d3b6dd7006e65aa5075eed1dc9b8a2337e0501e9a7780a38718d298b2415cf30ec9e115a9360df5fa2a7
-
Filesize
21KB
MD56ff1a4dbde24234c02a746915c7d8b8d
SHA13a97be8e446af5cac8b5eaccd2f238d5173b3cb3
SHA2562faaca6a253d69be3efb96620ba30e53ecb3de12d5285b83ecdba8cbc36e7311
SHA512f117b822aeb0a434a0750c44cbf4cdf627bfebc0d59e266993a4fcb17a7a0519659e13b3bcf8706eed7d80d0ce33b0ce5915afe5872c37c010a401dd6bb1187b
-
Filesize
37KB
MD55873d4dc68262e39277991d929fa0226
SHA1182eb3a0a6ee99ed84d7228e353705fd2605659a
SHA256722960c9394405f7d8d0f48b91b49370e4880321c9d5445883aec7a2ca842ab4
SHA5121ec06c216bfe254afbae0b16905d36adc31e666564f337eb260335ef2985b8c36f02999f93ab379293048226624a59832bfb1f2fa69d94a36c3ca2fdeebcdc3f
-
Filesize
20KB
MD599c59b603e12ae38a2bbc5d4d70c673e
SHA150ed7bb3e9644989681562a48b68797c247c3c14
SHA2560b68cf3fd9c7c7f0f42405091daa1dda71da4a1e92ba17dad29feb00b63ef45f
SHA51270973ea531ed385b64a3d4cb5b42a9b1145ec884400da1d27f31f79b4597f611dc5d1e32281003132dd22bf74882a937fc504441e5280d055520bfca737cf157
-
Filesize
38KB
MD5adf2df4a8072227a229a3f8cf81dc9df
SHA148b588df27e0a83fa3c56d97d68700170a58bd36
SHA2562fd56ac4d62fec83843c83054e5548834a19001c077cdb224901237f2e2c0e4c
SHA512d18ffc9a41157ea96014a503640b3a2a3931f578293e88cc05aa61c8223221d948c05637875d8e3ee5847b6a99341ea22b6a1aee67c170e27bde5e154cf1b9ca
-
Filesize
41KB
MD5082c469b33a31285b4c182bbe6a1b499
SHA1d2525c741034e1ea6002707ef528a270fbd2fed6
SHA25609ea9ec8594cabda1edc0ca1ee990be1f5c564d0dac06e6a07ac03623e5f4f1a
SHA512a731c121e9438f8d5cc0fd28939b0493f5bb37013b60e78054fa6c4e3f72d4cd52c5bcd9e3dee36903fdc7e06aa3af879d706f360eaf6ebf750ba74d595263b8
-
Filesize
55KB
MD5c649e6cc75cd77864686cfd918842a19
SHA186ee00041481009c794cd3ae0e8784df6432e5ec
SHA256f451a4a37826390ab4ea966706292ee7dd41039d1bedc882cbc8392734535393
SHA512e9e779870071fe309bbde9b6a278d9627c7f2402b55ac4c0a48c65b1de5172cf9dad2992f8619d7e7aaf978e6ccd607620de88554aa963f3d45501913ed49f64
-
Filesize
16KB
MD5dde035d148d344c412bd7ba8016cf9c6
SHA1fb923138d1cde1f7876d03ca9d30d1accbcf6f34
SHA256bcff459088f46809fba3c1d46ee97b79675c44f589293d1d661192cf41c05da9
SHA51287843b8eb37be13e746eb05583441cb4a6e16c3d199788c457672e29fdadc501fc25245095b73cf7712e611f5ff40b37e27fca5ec3fa9eb26d94c546af8b2bc0
-
Filesize
18KB
MD5ec02df94928186d3c6b59ce65f9000a3
SHA1ff25873724d5bee7c3a1b0f70853f3f4db93056c
SHA25631d2638dfacb6328063cfadac99239427e0eee86cd28e2deddfe4daa39c55674
SHA51269ddeb0dd61ed03bc060b9399504988ee0c72c4de46e3a6efc967bb3686a593dca9362121d9b5106e9f2e355238614c5d108cf28354b53e5aff6f5e2e112b873
-
Filesize
22KB
MD59b5558381a28d410bf93be576c4e1ec6
SHA167c25103d7e61f1b482a665fa0d86921876765d4
SHA2560adaedd1b52daea4ac19cbe9c095eeab8d4f288c1eef838aa416308580cbc665
SHA512aaf3b065030b0fb7c5a689d4c44d5cc2cb0ca6a79ce7cdeca3c745c01bf4f64e44de2ddf8e06cbb35eafe0e7a005a34178c4185a5d4cd4fdab6fdc20df44e0f9
-
Filesize
107KB
MD511341f03f951333b4309822a7ebb0907
SHA1fc813cb6a262e6ef9991bfa2711ba75e7a0894dc
SHA25699aa368241f22add83b34dd05541d726ab42a65f3e9c350e31c0129684b50c1a
SHA512089cbd6d797f4e086e945dbb1345f4023fb0ef4daa9d47368ae7f253cbaea7b6236cfebf0d19741aba415ec4f1c3443050cabad756c55514ba2bc0bd7442bac5
-
Filesize
26KB
MD5525579bebb76f28a5731e8606e80014c
SHA173b822370d96e8420a4cdeef1c40ed78a847d8b4
SHA256f38998984e6b19271846322441f439e231836622e746a2f6577a8848e5eed503
SHA51218219147fca7306220b6e8231ff85ebeb409c5cc512adff65c04437d0f99582751ccb24b531bbedf21f981c6955c044074a4405702c3a4fae3b9bf435018cc1a
-
Filesize
18KB
MD5f1dceb6be9699ca70cc78d9f43796141
SHA16b80d6b7d9b342d7921eae12478fc90a611b9372
SHA2565898782f74bbdeaa5b06f660874870e1d4216bb98a7f6d9eddfbc4f7ae97d66f
SHA512b02b9eba24a42caea7d408e6e4ae7ad35c2d7f163fd754b7507fc39bea5d5649e54d44b002075a6a32fca4395619286e9fb36b61736c535a91fe2d9be79048de
-
Filesize
18KB
MD58bd66dfc42a1353c5e996cd88dc1501f
SHA1dc779a25ab37913f3198eb6f8c4d89e2a05635a6
SHA256ef8772f5b2cf54057e1cfb7cb2e61f09cbd20db5ee307133caf517831a5df839
SHA512203a46b2d09da788614b86480d81769011c7d42e833fa33a19e99c86a987a3bd8755b89906b9fd0497a80a5cf27f1c5e795a66fe3d1c4a921667ec745ccf22f6
-
Filesize
87KB
MD565b0f915e780d51aa0bca6313a034f32
SHA13dd3659cfd5d3fe3adc95e447a0d23c214a3f580
SHA25627f0d8282b7347ae6cd6d5a980d70020b68cace0fbe53ad32048f314a86d4f16
SHA512e5af841fd4266710d181a114a10585428c1572eb0cd4538be765f9f76019a1f3ea20e594a7ee384d219a30a1d958c482f5b1920551235941eec1bcacd01e4b6f
-
Filesize
59KB
MD525b3d7b6beb44eb20ffd065656c15e1d
SHA159301a1a36a144715b51bdccde1eb2a328f7efd3
SHA25600a88a411e1a1ba98f55fae99469271160c23d87b1f71f90f31a7810f063db9d
SHA5128c71c4b268832f016dc20f68611abe976294421217f7834b5d409b53b0f0b137231c9364eaa84eb1afb05fbb121a0ebd263e52ba60cda157ae892219b462e145
-
Filesize
16KB
MD5686cd4e029335cb803ea8b47ea727bd5
SHA1acb03acb24c943d81a8e4822466201cc4114692c
SHA256785ffc242cb18f8e9ccb9ab96c37df3cdf1612a38a325a2a9bcf8164eac6488d
SHA512a54e055ca8e021757102aa6c7f9045959fa32a7db215595cda8419ac96f75f44e1f5846037e14b6a20d0db51c4b1e974aff1718e16ff5d7650e0b667ca09721c
-
Filesize
65KB
MD53d636838c651670d5e9dcb2732402a4a
SHA1499511c375549d73ef30e24b978d58d9474eb8ec
SHA256e7fdbe8a4e3878599e0c65beb8a6adb3f4e9db532cfa1ab3e24ed8baddbd1b84
SHA51291df5fe15084597a2eee81b9590414560d70776b2d88d1e896966dc59823819272af1b171ede68ddabf62a1e6e3dd493e5989f6f6ebdea359f9ce700ac96114c
-
Filesize
1KB
MD58d67b332b1e14f39abc2a86cd58c27d0
SHA1b322673489e3fdb2cdf16ecc1e26a437efb5458b
SHA256461ba52adaefa2e54e6833a34c6d51ba35b61e7a994608c2fc63af695aded0ee
SHA512dbae0e310a347a05c465ce9af9bd2063e4621897f831d1e3a1615b87607069c80a5ba700bf4d3f9c36ced4146b0c6197c2a12ddd895af19714d7394990f9124d
-
Filesize
1KB
MD58a2ba66220172f081040e2182f0634d9
SHA11e0efd8e28ae44369fcea4163a47ff4a5eb3f15a
SHA2566268cf0f753b8d9c0a993cc3e130d82bd7315e6ac5ee4f2963d281269fa8bd53
SHA512ef5ad433cf1be1637a8aed7475ac83d4394346fc3f2aceb47aaf320cff6d60108705f415e376e66e1501189ce130675a368ca4f79db747015f840288ab03bea0
-
Filesize
1KB
MD58ce8763315dbed05010e57a0697eee21
SHA1195b6b0079332d7e5f92d0fe66f7f2ffe6a582e8
SHA256929994629cffa72c5d425c3544a1417a99ea2ef6608d5c1043deb53873adeea0
SHA512f8cfcc96238c751e990ad7907fb826038d7a7210dbd24774bf5716fa64e1a76312ba849d7ecebea23b2abc33534d96b4dc1fff1666c4f8970e0043aefe648a17
-
Filesize
2KB
MD59f3bcccb2a7bb641c6b4c6bb02a81696
SHA15e1b8257f36ba4e18a93f887d238afacc8a894ba
SHA25669328c12c3720a6980cfaa6c62ebc076a37132e1f240ba46764a696b89f43866
SHA512894de9274b37dea5ed5ae52a2254bb38ad134cbbf2ca51befe708d91da404021403c9c25332d9014d365c410b18d9a8bd6c70491feb1745bf8816dbf2c94511b
-
Filesize
2KB
MD52034cd35c9b7904db4bc18737ca883b1
SHA1e4ecd438ead5596ca8cbe3f7ea9f9d00576f5229
SHA25623724bebd64494d35f094ff78d61e95bf8f7c5e6d6f4b58f043f554de5de1459
SHA51235ce8ee3ffcb7653086799cab6e4465a77f95da7630e114e3111424f33a1fc047c147f32f31c34c007a1af5e36e72f65b9de341b209622d1f70dd0b8e010fb62
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5a6d37ff5e712467a0a9ef7d84760fb9f
SHA14fb99bc511bc9263e585a911eb1bb4f791919c23
SHA2567f373af664af1794b20a7e23322ccb187b945a8ad4db7ff0a35cce155ad2317c
SHA51263e792f74c3dc6d042eefe88572f089e34fb6b4776fc4edc2b7d993c920d335d122219cdca3056119fad2ca509927af81c63bc09e8ffa4f770e21edbb1b037af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5a91693853138ff7e099ae7d6d71a321c
SHA113f3df2071d5dc9104f4c9949d93d2d4997c7f59
SHA256a79ee8fadeeddff755ca4c81c0921f6d38312cee6d76f13f7f523267beccb64b
SHA5126f022b2e228ed6e572893b7a243c7fefd074f74a05085437548d5451008e06b317bdb824798bd1fd6ceb47170fa9f6ce5cdb1e1b139bd580a2e756c08a7823b5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5398272c3d82f92f45e8e4c1fa81e072c
SHA15b7384bf8ca9dc1bded58ec60439121a0c55be4d
SHA25608be4016c0fbf939204c6b94716997e3ca5d4dec3b3aa7d51fd5ff8f5c876940
SHA512452562896e601eed3cf20cdfb5b3952a1b97929fc209715a1f2644688005dcc10288a19f07dc5024013f21271cac6b4d15a1632680913e2822e40346538eab89
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD56a11bfc46acf268d06994d5cf1552ffe
SHA11bc51193eb7b22c8c7a542412ac9ff835dba10b1
SHA256c99b5c8af0ed9876acdb8d277b3c8295932657f0c3b4bd8b645b8dcb7a62395e
SHA5123e7e4e7081cc2efc1e88cb3a4eb969e6f6128bfdf78dbe9f157b8d119d39f4841396a89e64ef47422e87f0816b2d73c1706b972e9012ba16958532313465163f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5d4e192aee7f291cbdf3cc1bc7f8479d0
SHA1413722a08d463717cb42e4fb52cc30a6200509da
SHA256b4028b53dac62e210a8559e4afa97bb5067b2f55e46292ebfcafc43a3848d1ed
SHA5123493f1db8c0dfefb309e4d1fc3e90f9563a5397d36added0f66f7120fe88a0235b95a1847eea693b97a9a4170fe32d5b21ddd89ca99cc36caee11b6435981da6
-
Filesize
1KB
MD5863cc37e80b8fab4d158c9f8e1f4819b
SHA1a4b4bdf0ff1d782ebe18996878b815294ec136f8
SHA256d5b9af6e3af507cd94f3195a33be3074157da89e193b040d6b59af6f601fd3be
SHA5129ac01c415c4e7827a7cd4b9dd64f2145d8a85d90fed9c6981e99aff02359617a49719f1c982034b4fde07a7bbb1ae8ed1e0ce941525f69ce6a598df27b8687b7
-
Filesize
1KB
MD5d9fcf2a9ac0e59a26473a398f9a78a70
SHA1d7c405095618eafd2a3e0d5b73488758512b5975
SHA256383961d5b4e013df2ade17388d80103eecb8d0f20427891f98793cd0b8d8562a
SHA5127fbbf948b890eac1c76f183ac04906cd2c48ae7b76784bba389c324e23a3e82187014660bb90db518822c9bb660cb037d2d1bd58302df9853890c870707d8a21
-
Filesize
3KB
MD5e8fa7525dfa14ef627198cada0498752
SHA16c40b7d96aa306e3d996057ec17b528f1b3a8c85
SHA256e307965df85ab21de9866a9baceb73a7775772b7c9fa30b5f066b70476061c2f
SHA5126c14bdca361efdcf386f1aa7f0d6a060ccc38a37824aff24695b04af4346b62bec76b6cdf5d893125c2d4b45a30434b83a13e2e7d048a909230281938ed7079d
-
Filesize
3KB
MD54b96ca1623a7df8085b7396ea6ab4b8f
SHA1879d6ed56962fd5e9318274031ccd2c78e85a826
SHA25601328e2821701bbab129a2c16dcd7381d328ca6b26ef3359891c08c502c85fe5
SHA512cf850deb1b8410638aa96603b68ac549961f7dddaca1cf53c3e29ae5efdbf9d06bfa406acf99cb4b02fac3a2a1974a5b32564a561e387669fd8297aaf9521e0d
-
Filesize
6KB
MD5e703f2950566b32155c4b1689d7bb407
SHA1128bde1a649d1aa79f43f408ef968ce824229350
SHA2562db353cc6ab6f189a97ebf3f7565ea4896f7ce010fb8938ec932e97f7385a892
SHA512e83fe7eeb7d67a14093f2012968793538dd825b7c07925d472afc90aa29ac4814590350ccd83cda4b738b32eb7c01880c9da15a980711ee8f7760ea0086738b9
-
Filesize
5KB
MD563a8e9f8a4cd84d8e790735ece11310b
SHA17c87433ef2b2675684a59508081881a5bcfc4ba6
SHA256a9065cdd4a3ae1ea840ba777e65d44c70df4c7ba5bf325c1a00e3713ad68ddfa
SHA512e56bdf96993892d3d24c8959374a3628a31bf2547aa9b62a8ba2efbd8b4e2a5086781e74df23be276ff88ee7f6c586c34dd3ab0762ddb49319f5967091a56c96
-
Filesize
6KB
MD58631230f7e979378c7b1563fb2782d71
SHA101664e73a0662d20b254161336e3e4d1ed928e47
SHA25690936bc43c4477e1c269f852bb7a7624008e7e325b4ccfea1f1ce6a50242fc31
SHA512b5965aee30448b6e56be7657e306706714ae3b6c99c5537038d59536bef8221e4f2572e081798583ea2ac9a32a1a58d132a901f03e14412274936d6ba2abb540
-
Filesize
6KB
MD534896221c345af5be67cbfe5c7ce372e
SHA109e7f3822473f25df300dd9e96516ebdd60c9682
SHA256e99ea4dc3fae7d15f189681ece460b068f4eed52c04697e8fab100af5aa17fea
SHA5123301725fcb2c20b3f0cc6b1930f8f06bbd67a519df2f35bf204b91dce2b7ea98ee7e51efa0718b2e44ff094358f06cfa810959f3dc211ef2ac80ca778b00a4aa
-
Filesize
7KB
MD5faaba3a56c1a10589d5b2cd69490012d
SHA1b1569e99fb897c2b9d15b489f80048fbe245b24c
SHA256c0a8fbb79f40ba21ffc881cf01f94285dcbf49e7b72e61119f669a8fc50f72a6
SHA51280eba529c4b82f2c0483be5a38764ad93c8f4236280f0dd8f93adfc7df270252f9ab0a4ac8c50899ca59ba8f96dec733943152ceef1986880d95a0a9c5201b4e
-
Filesize
6KB
MD5409717f1074ad994e673fd78c7397b87
SHA121a131aa60b45c811ea6c1f4e3f4bf439fe566a9
SHA25600de1f849178ac6a73ac66c2e91c46b7157700fd586b41a0580f22e78a15ef50
SHA5121bd5514dd1973e6a1aec76626ea42d95f00198a5405301859f68eefb77d0836b07097e13563ffac6d84a05c404d748d13cc7a6802122d9de80a66aaa71541df9
-
Filesize
6KB
MD596d018514e65f5d7e92791be45c68453
SHA1161cebfc3523398e23e4ae4ae930b4dfd5409e36
SHA25662b06999ddedb291e60c7e8c1e5f7ca7f43e5136e5fd07db1a53e93ac219534d
SHA512a686d46a761952416648c6d49cc37d01d32773435d744b901d7ada18103c2ebbce88bf7a2468afc76171e994711a3fc0a033f445fec1c31dfb06f7845cc4bb63
-
Filesize
7KB
MD5205ee00bb9cdd6a378b368360dae4587
SHA1b86041aa7ae9019ae252520bbb74ff2048fea0ab
SHA256545abbec59bc6cfc7c317cf880ceb125d3590f6f1b52649e888ae991cb9d95a7
SHA512361d8783d406c6a25a813ed406021e01263c4d7f875b89e2db59df7c72f57fb99062b86f5fe697317e6e42a089bf9e0d382c25dcb3789ab1988af7732d4bf0ad
-
Filesize
7KB
MD5a2e0b7aa8c133ec4e675dc6a0c9cac92
SHA1270cf4f27cf86bc73fc0b55bac9c4bfc2660332e
SHA256b3e263db7ab9475e07ee8db0f3f2ab0225c66d2e7cb3be361867d829f5209136
SHA51286b26d3a1d78e385f73a31faee53bc0032b0c27a0f3af90fe82cabbfa8952422fc11c4897d7232189722a1d5f667bec86613f09e4d8b7b16d9f53c5747a48011
-
Filesize
7KB
MD589b3f6ef06ed3c06f26fa9092b5d9842
SHA1728f52cc16080c90d9e1acb03c15756bae7e85ac
SHA256c5d0c768debf91e42b3c1f8bf23d6264dc9b4991a971ec66b5dde615b6e8f602
SHA51243822d956bd91d51f85b0b9b947ad747910b931565dd41aa3ce893c0e14f4e9530894f89dc77ab970ffc7dbbe8a792dcea4be188f5a7b6e7706779a819a42634
-
Filesize
9KB
MD55f122ecd9cbde4257007e49440372ff5
SHA14d96cdee36f0b2de5777571ecc107631105f71c0
SHA256349550ec266a5b106850904a901a963ad0bbda9ac44f084d3c8e50f873eb439f
SHA512573b0a176c376c2713b08d3c8a5e5c0a646c110bc786db07312f339410061e39f78e4110becca6173e029b8c825b4732e678b4923b03001115ddc81e1523194c
-
Filesize
10KB
MD55ec15de44f3c6ff7b9db58dbf6d985bc
SHA1476f41d2aec5918d286022462e821660f23d4072
SHA25652b2ab06ee66b5dab211a2628c5f1fb2ad5b1a07dd2f08d1181c256e01304a60
SHA512fe32932a8427285da434789659398de56f5446939d7e3f7ffc0b3ce29192a79b8c7e65ac10fc84fb80277843cb7fcbee0c39d1938d130870b08f21ab676598ce
-
Filesize
24KB
MD57a6b081c196dd786b3117d9725df966c
SHA11c68b0d4e7f7bd3724fa212aec03cf7e0677bfac
SHA256749dc5e0330559354a240f21f3dbd5030a8f7f4a1b39c15debb87d06901432bf
SHA51212490cc499b3fda45ddf92853def00d5d104d7cdca55f81475c28d9b1aa38c87c1c19be832b3290c4c6c67d4da4b8ba56034cf9e4016bd6a87cfcf46f6d72873
-
Filesize
24KB
MD5da1821e07e4d7165997669aff8e6af7f
SHA1fef974546b0dd06c60d5dfd724aecf09737f015b
SHA2567232764846ad0d85709d6a397a7dcfa87823746d9192d0a5035127660567caeb
SHA5125214c108c2b7ecb72a97fb198a2c1921d5c30c7c3122399bc5cdeb0784875ba4133733f66ba8ec49a9e08c472ff97ea3db4ab440bdcdd9727e89f84c757a24f8
-
Filesize
2KB
MD5d0a4627317ef75b994c27c5097c50fae
SHA1a359c179b8bdf9fda973573b4b3faf3165d314ae
SHA2565a9c516025c3d715a0106f27b9b61bc949ac8d36bf71975ba7727ec36cf5dfdd
SHA512475b9c60af4f47f1e6b17dae54c8d804decdcdf025b0a94fb69feea4aee429b7780dbdd9d199b39b517ab29b9f89cfee52a3031bb69df2082a41b6c7bf2201d6
-
Filesize
1KB
MD5821f0c90699304c641de6c1b0dd3765f
SHA1392f2e620b53d2aba1c8c1f740e5a72b6916e88a
SHA256f904cd07bf38cad12aa4a6503b5875fcf08fecb81f4b922b88daf86ef3ad59b9
SHA5122c87e17663951905134851e1181e41950278e9ea62caf45a7af672b3e1f6a28268794fcd7ebb2c3a7e15441c9300218a6363c656558866575226c21bd4afcaa3
-
Filesize
2KB
MD5353dd82e7e79346931d34794c548c808
SHA14ef9fe360aaaa438ae243c3c1f87c82d9a53c6b3
SHA256166214f66d633ef26799168226f3fd913818f0ed05adbd1340c6ae75d08f51e8
SHA5129baef793ee09e0107c9cb03d73e484fd0937fd12c32bc221d220a8e6641e7e54a57dfdb433f32924c2b8b2ff12bdd7b2b1d42dd1abd33cc32a11f637f834fee8
-
Filesize
2KB
MD5f480540ddb92ef548b8975a72d0dedef
SHA139a252afd4866b613ee313eceaad850d7dae471c
SHA256bfe597daafbf903f535500102bfd2161b32ac5a65eabea4ae6b5257a6f5cdf23
SHA512fc5e2dc5157b4c01ee6e4ba8948fea5868640ea997c32057d86e1b6963697c7fb6122e4fb56a7f9bbe8cfeb6c52651c75f74bb909238e6ca18b20f3211a854c9
-
Filesize
2KB
MD54a6e5d84b99ff539367bf41ed34bf00b
SHA12ae985848f9d09fb1dfce1040f7c80eb62ce264f
SHA256e43ebf76a1fd239e2b0f73996182e338c5b238bed48c42586dea302934cbb2e6
SHA512b682b4a6c2a089cf2e31038c1105d2c1d02a7648dbed7b66683154789f94bab531ee2d155f6048d3f3508dde392e616effdbd0ae5f92f0d24c195c6ecb8c0d38
-
Filesize
2KB
MD5efba4b5e05040dc9cb19f82323458a8d
SHA184d2cae19912ae1cc7bed02025eeeda66596adaf
SHA256b63e44808c202ffbf4e9ca716b7aaaca88d0a6b695a065de23d0b955291ffaba
SHA512010e31a55ecd9acc2885997cdeee1e7a55db5c71e119d6fe24eae9a6f6cfecaf269aae0524372c68664157061cee37714b0e10aef013f4539493a3fbe1af0677
-
Filesize
2KB
MD5a235ed5c1dabed5304d03bf62f6a62ec
SHA10f7a40c08ea70201993b3a907b3c6e888176988c
SHA256ce748edbffc038b167e652b1135086d64dd1f7a9aa208b4befa34a883880d95c
SHA5127f9b70b39af64f0c066073473269ebdb9b1278fabad0db1643a89367ca50ae0f567e55b6fdcfad2534d3e4635a37504ab04a57a3f994598855104b02914535c3
-
Filesize
2KB
MD53f7d734e5fc4759d37ed7391e80b8034
SHA1f5b7fcfd49de12052115c38363a5e005a0675347
SHA256f4f5d55535ccec988b28f1a8c5a355641255c496da696d39ea70652245a9cca6
SHA51235d8d4b0116cdae12111c13ab32b39da94b0bd3815fcfbe4f477d1196005f18a8d606abb830da1bca8d1bcb289a1b24488abe4271e9803911e895a5ac0950d8a
-
Filesize
2KB
MD5d75c181ed57fc767dc909854970e9550
SHA11eae99a5323a3780f41cb3a179b691a818bca204
SHA2561f758a7df9125b5f99d94a1a42a7edc0fd52da0e96ff2fa90e8a93f51fccca3d
SHA512c01f5643e61006d918e702faa9c2611afa9cbdd73c5f1ee3dcba33e6bf0858e7c46ab961bd791328168fe4b71ecd8d92f3caf6d53d3df917a6059a5b8733ef37
-
Filesize
2KB
MD562bd9c91c13740c011d4db8d19ad2d4c
SHA1533ca345225aa83d185ca9f86c99e5a994449e7a
SHA256b69ad61e60a910710b32a8b9c3884c267dd0e3f2ffb7befc7dec8ddd6118219c
SHA512451701d5b43b1ee67b14e30d78f5e361a95f48467d023d412ef75e04ce6d204f17c147da2086decb6f1c4c0376b9c93500b352b350754682bd456b843b1dda45
-
Filesize
2KB
MD5cc50bbfbcb7dc980f5069ad9f67810cd
SHA1754744398e5d774d148eab2bfa50d86f2f32c4ca
SHA256433cf50707aadb377210961b004cd34f61abd8830dce10945f42795d03cd097c
SHA512852b810aa82d48ec9b59f8749b5b6bc4eaa821fd8ae3dd7b0c8091b320772b2a471e06bd3119195945127cc531e8f46c0e99388fc64828d8b8dbc41f35c13c9f
-
Filesize
2KB
MD5fa011b12189eca1b6c4c8a2a4331cccb
SHA1f2471475fce1bc42cb9aab5efce2b760bc453c03
SHA256afeadf6b161538dff62bf1b3d81a9b3a199f22841d59b8e27465dfae1f6e5c40
SHA512ae695d64879b3ed4b7093131d63bd45d19494cf4b960fe8771c2f9c999c57849a6f1fcd1a48c04818f39bee318763d1f7ccac5f6ad924de786e6365b4189fc55
-
Filesize
2KB
MD58b73c06ab4319bc47733d23ac82e8bfb
SHA1498490b09663cdc11d93fa0ae96f9a5e13f1cab6
SHA2566143170cdf8d6b74989ecb18c29fbac85f7cb8e3c9020bf62b5bf632b615c391
SHA51246e00d1b16944df3fb08c6f39c0056ac054cfbe1718b1d3e3c9fccd1ea548616d648ad67f32d136d0ba40f2582c26dbd4cf7755a3a911450e8f41fad0beca674
-
Filesize
2KB
MD5c58d9c89cd734439ae69b82d2bac0fad
SHA1fb923286d1136f4c7a3173fb43587e4b4f774dd1
SHA2568256892fc9d15c2403fc82fd3063104fca3d1c16a544a4df7a5c057bb74c3b4f
SHA51208bad8a8b7661999f9b2ffb427e15a958ec6af709b1866a937d7f70144bd8257930541192788391503b6e8717b70fc9bff1b20b6df22e3bab5659d211f8a2d05
-
Filesize
2KB
MD57af44facf5fc6a025caa3b03b0ed0834
SHA14675c823ffc42de6bc55b144cbc194c07c084d85
SHA25662b276521146b41201eff62672927c9c785ecd4733cb4b13db48b004a726ed97
SHA512330bdc65da093e85efd27b541d04f06d4047148d0f9db0e5f2fa5fb0484fe140bd752e617ff63e54ff78484282f62ed3a3d28daee6d9b5520130be66c805bccd
-
Filesize
1KB
MD5e5e2bd366e2450dd5b48d9c4eca6bd10
SHA118e32ae52c0c11d172d272d4b5ed8e30e1f15f1c
SHA25645554b5e5e048e6f71d6e4b80e22f6dec7810253f1bffb9f04a251a17bd930c2
SHA512cac5fb7c29d26c07a9064221f94afde3f5aa5a4f781e31af690ff24194cf2c2e47017b19a7f915feda017d16cceca25fe0a49f79904927bd81a081df0ab5cd89
-
Filesize
2KB
MD5ca94e92095460537a5b977c5528ad847
SHA172d4dbaa5628dc8320ad50813d85d5803c4cbe17
SHA256b8abba37a17ae332bf1b0eb66e5d1f5452f2af18d7f4e9a7e4b1740bd233135d
SHA512ee1a47711965e74f6271fb67bff0fdaf4654f5493197ce638af740c44338232eb1b4fc2e5530c5f52775048c486e889fee2cf33ce1cc8a8569ea9d50d1efd57b
-
Filesize
2KB
MD5b7e6a0de516755953b9ca4ffb302c6db
SHA1f82334fd98b880d580903e845a8b9a555f629a82
SHA2561ab322e807e5846c089daca7a827e5eea96f3933334c441a3591d2727a10601c
SHA51273b9e76ebc83056b3cd60bd7310234da054fbc2ff65f726851f053d588b5a530c5efeaa24d4eba8105f6830b089b83371c04a585ecf3ef1dfea08b70fb6060f0
-
Filesize
2KB
MD509de149be2ea37ab0c3c9c8a4a00c6d7
SHA12e2c5b3bead09c007ac0895eca8607a66573d3fe
SHA256fd4d3d5ec62f2eddd71825d01bf0a1bdbb91fa6db2beed3cca49f72cd9579f6f
SHA5125ee6883c911e15323385802bc59c559f9ceb710d1cb80ab36ade34c683e5e63111945c39e4e2d6e19edcf936fa9e083612bacdf412a737417df4bb396475f53f
-
Filesize
2KB
MD5032507a6bdc56b5d8bfe9d786c4fdf51
SHA1787c9ac890be2574857cddb84677756b07a90cac
SHA25613f5dae3c2b42ca43cf0b40cadb9cde60ff0cc50029864ddc49f348dce049493
SHA512ae7695de151a29476b1c6342861782da84353fc376956fe1e0a47cf3cdf291fead81fed68497a1c5ed54f727e489d7e50800fc35ce0b68b25eea2aba12640165
-
Filesize
2KB
MD5be3964d39eeb5469fca18c85062fff9f
SHA19b0162bfebdc8af41fa3ece18346b57c6536bb0d
SHA25699dbe17f5cb1477f0f2154c2b9c28ae81029b796b4bcc221230d89d77b23eadc
SHA5126e06e9616b0c2e4461bb0d634b8a5141967b4ef3bb492a18c0199d5716e2ec62f6f1645dd441270a40c93f58e7da8d4b1fc122d664007b0d5703ed4a46087586
-
Filesize
2KB
MD5befd8c72185eb338f6ab3d0eff814917
SHA15a31d7bb44648ffa6bab7aa662c2e659f3556bf7
SHA2565deb2ec1c408ebeb75118171e0d2ea872daa06381b72a2688768c7cced579bfa
SHA512ec29a6e5221762d73b1475ec5b17e50667352d2fa8c5a90017e1923d7ee8c3fbf6f6a0de55eab2e6dc49873830b33b6dff79ae00b790a12451aa8ef09c3d0c41
-
Filesize
2KB
MD5eaa0d532f66008f822e6572517ab4e8b
SHA1fdbb8e65504d4ecb13b80e3ff688a454d84a4f9a
SHA25677b610999694caa8d1a1b14f8210faad62e3c082c4ca908cf0e88dde5a8cacf6
SHA5123efd1c58e8c101a9dfb0dafb144fc164a610e5097623e4fe800113ae79faf14a53bb3a83cbac79cf728a63dd2055c4df03396219cf4a354787e04815503bc1e7
-
Filesize
2KB
MD5fd0c21633626f4549fc72f0f14f3ef8f
SHA18a1aaebe157086b9d872d570433d5966ee052856
SHA2566a2d01c2621b267241469b474dccc36a02ee7f842c5695f663360db25a3ac3e7
SHA512489667f1d3c6d65ff0ab4cfe54431a1fcf3f8e583e78d540a9c2d194df5d7bbc09d4dc9471c3e6d527fb6c4aa13e858d1782205372cf6f9b8fdf0c557fac4bdb
-
Filesize
2KB
MD5fa1497585ee4266a23cd423ee21ac8d0
SHA13864c49ca0ec0dd0b3725c1e3f62dda13110a7c1
SHA2564680bcd9569d9511b630f14918ae16fdc1bc4d7201704b5eb2201965eed09381
SHA5122ce7de2b9131232015c0ad3ae2e1bb3aa75d4ed6b626acbfe9af9df5cff2d8151a4384c3e74ff4af297e0a4c0a2b9131bd375895d722fd69b0455db0e5a483a3
-
Filesize
706B
MD544a5f84e322c6fe276626bb540485f84
SHA1191e0ca17d856b0cdd0152535144dfa4237a0ff0
SHA256255b6099e9f039f1555b39055ec35254953799f3bbf7b201b993917bbe6f2767
SHA51236afb96fdc8eff1739c67515fe3472fd193d45737fe39f547b7ecc8ff36020b9a3028ba2acb949ddfd64fee1e09139b75e24cc8e067ff36fb5e5f18728678ef1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59453a2d059e85ecbcde9fe7a9b7c9003
SHA148527e5c533299fc599d43bc1d4e286e4fe30fee
SHA25674dba7b094021a4372030652b7a0520b7fe29bb004f376969bdec6c823a1278b
SHA5126f112927fa53bc7068c3552268ba03fdde57add10967847a6a941d9f541d048b972cce4c11b1c696108a6a40cf8bdf81eb7fa0022245081ab3745f249eb3911b
-
Filesize
11KB
MD549f7436f1b9ae714c018813ce2aea436
SHA15a4d8fa9c98ac6f468b27017491123120740964f
SHA2562e39ca163795705f0330e61c67092e7d4e64ea15db471d6cab9364031a96cbfd
SHA5124a5035fa394fd8de81597e48961a6fd5ad077534a0da50fdd91a10486dfecb2e03ec927364de243f96931fa61d23e791c773d5b4ffc5ae1eddc0a15dbc3f249e
-
Filesize
10KB
MD5ed4d1c27226e7ee879465eb08cb2b193
SHA1906d83531cc921d6d2857ace30225f9aaaeb521a
SHA256064c946824e6204bf00193642fe25c12692a07b9fd3d4bffae6edd91cd98f3fc
SHA5129711d9829ad13425a87f565ec5c6171595138d533626b87bc8b821f81d70fc6f86f4b91e764ddaeda26c9cf7de229fa1fb3e04c34124776f0356176667951548
-
Filesize
11KB
MD5d24b735b22691fc423405ed601b48cff
SHA1172bd2b15cce1712aa44610950d22a00a1f09131
SHA256585cfee905c391c5d6375df5687e813d943f803f78eee65754d7a6d15c7eebd2
SHA512855da79d966162d2a91ebf283c7b03de70f2f93552ac5a5a5a72c3452761fd7e0dab8085a35b1bd2f7c77fbd699d69892f9c646f008df138e13f6f437a36324c
-
Filesize
11KB
MD58ead6a521497d37542af78912a8cf0ec
SHA150beb98a67380a719162c44cf99c89e3680bf767
SHA256d91fad7c4826416b8d837697fe8b52e0ffb38e4f8aa52cf86be81fca0ae61639
SHA5121f7a059228b37be1dd8fdd9adeb5ab2d9fc466bbaf6576682e394c093ce1e1e89b88053c2639de789d043efd0a83f2a23be69827b50e91027707ee7444ae5c14
-
Filesize
11KB
MD5264da6c11f83793af54bb9ed24d1d272
SHA10e70e985b215011e941a557c687681ef0ab46511
SHA2563bad353bac46097bb974ca771471964b042a2e442e5dbcc80f63e81f18efc7c2
SHA5121fbcfb7d9b7005c6b835d1b397d78d4451f9d6b566789358a8f6eb2d6066904a30eda721982d6380ad5e84b0eb4eb6abc166bb81d5fb7a9ca6193bb092764df5
-
Filesize
11KB
MD58b450f9e022ab395ca530d32b47f648e
SHA16b77bd258fabfc6986761ab1fdf011d7155ce2cf
SHA2564f5c0dc6172e10d38e6cc468b57474e7f41ef2e5751b943be0d985cc22e047e3
SHA51260072c9359cbf6c52fb01531018914e9e730c23f9c4923c4be06c91b9fa3c261f71e370a0fa84bf0a66f21aad6106242c09b3900496b2a59c154d2169c251056
-
Filesize
11KB
MD58fed5c8c5fec55c56906d8c4c1a28276
SHA10aa8aca39d696052c7e1ac818a9190d04d0f2659
SHA2569f17241016207a183f393ea3c2c743a8e6bdb74de87aa8b18ef53e8238976120
SHA51248cd87039b70062914f5f3afe3162bb2ac0d23e04555ad38da40c2d5d85757742ee918767600fde812d85d99eba8ca773da35766a5722a8eaa053ad74c893923
-
Filesize
3B
MD5ecaa88f7fa0bf610a5a26cf545dcd3aa
SHA157218c316b6921e2cd61027a2387edc31a2d9471
SHA256f1945cd6c19e56b3c1c78943ef5ec18116907a4ca1efc40a57d48ab1db7adfc5
SHA51237c783b80b1d458b89e712c2dfe2777050eff0aefc9f6d8beedee77807d9aeb2e27d14815cf4f0229b1d36c186bb5f2b5ef55e632b108cc41e9fb964c39b42a5
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
31KB
MD5e7c6bba5b42ba92ac4bb7b7aa3c3a451
SHA135ab2a4ae5b17bae5a25e2fcff120a3f1681d453
SHA256c04947554b3939d4409830b7c03ee4b2b60e202bd016ceca59d244b8d766b5cb
SHA51262377c37bc30d0ea7ba815796d66aca925af29adb83e9b00b4b6d99fdd484dd9532f3393bc65dc2570d88084021cababb82aabfccbaa1f025611cd80d96856d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JQO36OFE\VerticalAccordion-3-1-656x504[1].png
Filesize1.8MB
MD50451aa2ba080ff70764b4b98e249ec39
SHA1396bdb9e39b280f8f76a9817d9577344b81a9dc6
SHA256dac56654d60a9a77084845bdc60333444d615804adeef310bb65d1991efde921
SHA512fd9d66c35c052b29788dd1adaa73ce11049fc34335765e4f185369657cf20cdbcbda452683e890cd093bd14e0c13c772ac61f8c0a43c2eef26d89b94e8dd2a22
-
Filesize
22KB
MD5cf6ae18a4a5a48e497570557391d7920
SHA1ad9ce2ad74fd0bcd5fa998cff895168ada13a1cc
SHA256993700d10307ac3485ea71e01c49dd2abae6360a5f1406e03e91c7a6532fc591
SHA51243e9e37f8de63d2131e3159471a8a7765a08a4efbbd1505a1fb1dce4a85ca2e7e1391a241b2e01509f69b5ffb183ab488d20341a5baace00cfd8d753d3955e8f
-
Filesize
87B
MD570f25a5edce5e20d870ff1c98a5ec5f5
SHA15fe33de0c8cb6d65f794c4dff0bfd5bdb15a7073
SHA256ae2cfc14f884e61f693b00ad0945f372face67b1fc49c6479502cefba3b82e9e
SHA512e4db4b122bc436edaa2dc810dbe1b0d61a5115e01a05b8e4f0874e639781b517b70ba5a80e1df7176aa612917c05ea10c06fc8114a8caeb00b38b7b01f8dc34e
-
Filesize
195KB
MD5a8c4838b540dc3189f9077536ec26cf4
SHA118cf57d4e1561a8c3c2fffe6ed884156b8bddf04
SHA256acfcdc2dd1804a15893452b5b6fa6ac21d9011e44593a0b3f09a25e028b93ee3
SHA512b1618a37e17bb45070eb866951e0cd390fd6dfd93d0307c093d08f346102285ff99789742c973ee1d3101d1402dbc8fb0d20bbef18805521b5c4879c69edca3e
-
Filesize
1.0MB
MD5223fcb99a19536c96fa041f3957d74c6
SHA1e0061f2a571f182d50f4e4541acf3eaade5fdfc0
SHA2564eba6cc0f3791bb26d4c29f5163f242428b5372aa2a38fb493ed9e1fc49e7363
SHA512659c69302d7784433c00c68e03cda7b8137a86fbdd8e81602523d224f6512cd5b66d6ec2f0fb48ae61f1b3f5a23165f33b660fbfcb92fbacc4ba1e983f4155b5
-
Filesize
7KB
MD583567c1e81de23d79cd2f82d25b4c17a
SHA1d4d0b01ec15c596b5ae94fe29b61e74774cf6df0
SHA2567e25d0645d771819ca202c731c84dd2ddfaa0ac17d8d2eb6aa8b6639b0e0fc98
SHA51275d49245801f3594ccddaf89e6ca559e026f4b2ef307c8687fa5ec622f1c1123893188089cd91c3e7d51c5a49fea9871f153b9ff9541ede117f755e57f4131d1
-
Filesize
109KB
MD5e4734eeeb9bfcea1f28f4b841a0b18cd
SHA11de4840d5711610fc0a29e528995a85357f3abba
SHA2569e9e73e6a6a64369736aa34c1818613ce05d43e70a4e870a90bddba1d228cb32
SHA51266c8e9b255afc95ac317afa2d87e2816f19cd784677672601840b1d29485a0893c1da89db0b46ab28951058c4a586c222dd5a2d042f6f9c2d83824947d0289e8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M2LHEA6R\clientlib-reimagine-base.min.ACSHASH81b1ef0c4a6b80454291234fcd6e45b0[2].css
Filesize1KB
MD581b1ef0c4a6b80454291234fcd6e45b0
SHA11353f3119d378ffb222149ae19755423ef5347be
SHA256b05d865a37d5efc60e028bc9fbc6b63459c78d21b0b70b3797ac97c1ad9ba88d
SHA5126409931af06bae75e4cfc57ff2b877915404a9d805f8c9076390c4bc8ff634ba96b2ed561fcc4e57869110e62be05ab75a1578e7935cec9605eaa77c893643ad
-
Filesize
6KB
MD572f13fa5f987ea923a68a818d38fb540
SHA1f014620d35787fcfdef193c20bb383f5655b9e1e
SHA25637127c1a29c164cdaa75ec72ae685094c2468fe0577f743cb1f307d23dd35ec1
SHA512b66af0b6b95560c20584ed033547235d5188981a092131a7c1749926ba1ac208266193bd7fa8a3403a39eee23fcdd53580e9533803d7f52df5fb01d508e292b3
-
Filesize
7KB
MD59e3fe8db4c9f34d785a3064c7123a480
SHA10f77f9aa982c19665c642fa9b56b9b20c44983b6
SHA2564d755ac02a070a1b4bb1b6f1c88ab493440109a8ac1e314aaced92f94cdc98e9
SHA51220d8b416bd34f3d80a77305c6fcd597e9c2d92ab1db3f46ec5ac84f5cc6fb55dfcdccd03ffdc5d5de146d0add6d19064662ac3c83a852f3be8b8f650998828d1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M2LHEA6R\l7gdbjpo0cum0ckerWCdlg_I[1].woff
Filesize17KB
MD543884fd993aca8e6af5c7934c8bacb5a
SHA17839376405bf720aa6c4df5cb6f1c00fcec641e9
SHA2567234b48bf0526e4e1158ea914664f338b2fa8f836a40003834c5a30734430ba3
SHA512ec6128fe6f0a368ccbf0afec6ed27f4c9f5bab318c3510942f1a8d131a0adee5b123d49ae7b4fcb02f2d1412fb008f444b91510cb99be1d121ddb8f70048e42e
-
Filesize
160KB
MD5fdf4a73ffdab93e3a0422b9d2e252ca9
SHA1c969911ecf2414e17fc16c1a15512bab79842d23
SHA25626c3f906421451fb7a86d275288c9ea0bd6810959812edb6564e0c23f76702e0
SHA512569c53094876dd65556a824416bfd0016764205ebf6e61c87529445d4c619860a086895a92f735089da501b96e5fb3361279f9731f5d46c56695133bf8318b6a
-
Filesize
572KB
MD59ef197a076681c3d4c5e7a1e07cf15f5
SHA1350d4ad02899f3838e4ce3bca3a13deb496c5509
SHA256a24521823149886e4ebb47b4c8bdb7859985683ec302aaf941872b8d2852bebb
SHA5126ca063a22f226421c8c901e659a38180f5198a12af7a8d380d74de1e2fcfb5bfb892cda88770729a2367f2b23e5a1bfc34cede0fade20c4dc13e0391fbd41cc3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MVGQG207\OpenSans-SemiboldItalic_v3[1].eot
Filesize54KB
MD5280c7764c57f24c77d234fa6f191f76d
SHA1858490e012df4c5791164adf280639051607d734
SHA25639bdfebed792dbc9dde56dc06a5935e73b7cd44b6b5a7247c3512d123a4c7181
SHA512083f8c83eb4eddfd1651e26be886a57ecd515e0710e148f61103a3b9c467205495cc14742a86877466a5f5515dd3f17083b0a98d8f328867ecb1afb255a6636e
-
Filesize
184B
MD5cddb18b4eea9e1b8ff4272b968116176
SHA16e60488f3146c1c17129f3132794f4a97155424e
SHA2562a4b45515d12560e7291b073398c8b99d9060d1178bcf02a13c43b7f6ea8e556
SHA512e16e2384fbee9c154f5e680652bf1f45b2b7f47951eb3feaf68733b5d0050f100ad825ab6c55d257581d8c7b3d7cf35fe3a22a5d6a6b2586167b6d9f0b0c55b9
-
Filesize
16KB
MD512e3dac858061d088023b2bd48e2fa96
SHA1e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5
SHA25690cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21
SHA512c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MVGQG207\featurecontrol.min.ACSHASHc22ea5b46f3fcad90da0abcc0a3f73d4[1].js
Filesize159B
MD5c22ea5b46f3fcad90da0abcc0a3f73d4
SHA12db789c63afb63d98932d7b55907dc3508e318b4
SHA2568334daa260516bb896407461e5f10e8e3041b06c56846bbb9d3435c6e77513ad
SHA512a0359f8c25dc40ceffd14a41ba81794717b99dabe78cbf8a8678f3e3ec57f317388ca0dc55b1cc6ad2d6c13d2b3caeb5a64527bb2c646ed2d93775437da646f1
-
Filesize
411B
MD56f65b6608be4e65166d660fdc450fa60
SHA191862bd34ab08e3511b7b7f1e71baefd57c33016
SHA2567c56cbab79bd396e31a1f2a0891e23aa7d49e7a87c3bfd6d7ca445a095d73b9d
SHA51238fcbb1e3f5ac1fc959d7509b6b1930d6ee5e3284815ca13c2976501ca8f00fa0b5661d9ebb76e5800ca126b3d0564626015e45e7beb401ba42c99f4d6230e2e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MVGQG207\site.min.ACSHASH79cf9e2923b6eccf812d5c310d2f6b9b[1].js
Filesize531B
MD579cf9e2923b6eccf812d5c310d2f6b9b
SHA12fbb623535345bca7a4a0a47c90db9e7552e2aee
SHA2565ad30437fbaa7b3808340ddd7f3c79c315ad16d20ba056712c4189d63665a21c
SHA51274e2f86b4565e96470475fc520cf492f26e4947d66c4abdf8c19808fef32b7a80f7c006b3b62ad9c4511d0f6ef4ee1addc9212ed89522006f3bd95f5f8e1d113
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UT3050KB\favicon-trans-bg-blue-mg[1].ico
Filesize4KB
MD530967b1b52cb6df18a8af8fcc04f83c9
SHA1aaf67cd84fcd64fb2d8974d7135d6f1e4fc03588
SHA256439b6089e45ef1e0c37ef88764d5c99a3b2752609c4e2af3376480d7ffcfaf2e
SHA5127cb3c09a81fbd301741e7cf5296c406baf1c76685d354c54457c87f6471867390a1aeed9f95701eb9361d7dfacce31afd1d240841037fc1de4a120c66c1b088c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UT3050KB\mega-2_2879965684bb69348fce22212f5d3a81f44aca5ff71117b9f1455af0376ef075[1].css
Filesize206KB
MD5443f3bc862e03226c0a83a44a0677ac4
SHA1b3b345fdd82059aab8fdc8518e0566609e344db5
SHA2562879965684bb69348fce22212f5d3a81f44aca5ff71117b9f1455af0376ef075
SHA512682712059f185d255baa8ad54c7320631ed44392bfad8b878dbb48904737567fc2b743b55d85233e65e8f30222011db7305db6cb2956d5fcb80585b7a712fd20
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133829306946363589.txt
Filesize85KB
MD5d6da06d96dcea156e2e39ff51f0dd73c
SHA1baf669881eb7731ca09713d942991cd9ebacbc3d
SHA2561c98bbee3e91d2b8923e187e5492cdd4d403995645e96990f69b7576098806a0
SHA5123b67bdca01304dc1e5921732bb87ad9a5741138d59c4ad6fcefa318257452ec0f26f8a561c6ab7d2a327ef25346018e37a36b6c8b23e410d133bf0b7864bb441
-
Filesize
4KB
MD5ae74a5932bfd782f7a4ef84343f708c9
SHA1a26a6f0b5cf03efea7c82ed4bebf93640d7f6a41
SHA2567f7ad95740a0b42d872f288750ff37d4adf8cf856392c447b36c368c98a7d70f
SHA51225db7475cbdac2ded85a6ebf8072fa817c0a17ff15fa830a24e965e04eabba27748f3c6e3d5de9b2d522df0d970dc8b3acd33ea9f9898ef9e8c9f6f8b8fbde31
-
Filesize
994B
MD5a03c8dd179de26f92d16ae465ae4fcdc
SHA14440232e0bcce730c65e9a4747a906032eb6cd80
SHA256bc2b6b033c33816d9de39e94dd8363b3b18bb8a15053e5642b2de75a19764cdb
SHA512795a9be10f32e3eb4a02d642b8715275d0c5d92c5fd98a70b8f69eceec6fd4475e57d1682803f81a8bce0b66d3542c5ee51168f803ab3e1479cd712b72b8ad23
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
2.4MB
MD57e76f7a5c55a5bc5f5e2d7a9e886782b
SHA1fc500153dba682e53776bef53123086f00c0e041
SHA256abd75572f897cdda88cec22922d15b509ee8c840fa5894b0aecbef6de23908a3
SHA5120318e0040f4dbf954f27fb10a69bce2248e785a31d855615a1eaf303a772ad51d47906a113605d7bfd3c2b2265bf83c61538f78b071f85ee3c4948f5cde3fb24
-
Filesize
131KB
MD57ed5b8f6e5a564cedce1bde04419a021
SHA14be340967bb9f0c3292052f5078d47ee060f3955
SHA256f530b4f31840a9544e7794899e0310ab1e99c2ac58c0421a2d854683fb204f45
SHA512bf1e4b791f7423bfe5730d267d66cce9756f649b3b6d990e3ac4832016a900d3db6352350d179d46d206ee3b4897a069f42b550f25a448b16d9f39fb73a9c89f
-
Filesize
2.7MB
MD548d8f7bbb500af66baa765279ce58045
SHA12cdb5fdeee4e9c7bd2e5f744150521963487eb71
SHA256db0d72bc7d10209f7fa354ec100d57abbb9fe2e57ce72789f5f88257c5d3ebd1
SHA512aef8aa8e0d16aab35b5cc19487e53583691e4471064bc556a2ee13e94a0546b54a33995739f0fa3c4de6ff4c6abf02014aef3efb0d93ca6847bad2220c3302bd
-
Filesize
3.0MB
MD5b6d61b516d41e209b207b41d91e3b90d
SHA1e50d4b7bf005075cb63d6bd9ad48c92a00ee9444
SHA2563d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe
SHA5123217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da
-
Filesize
232KB
MD560fabd1a2509b59831876d5e2aa71a6b
SHA18b91f3c4f721cb04cc4974fc91056f397ae78faa
SHA2561dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838
SHA5123e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a
-
Filesize
2.8MB
MD51535aa21451192109b86be9bcc7c4345
SHA11af211c686c4d4bf0239ed6620358a19691cf88c
SHA2564641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
SHA5121762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
Filesize
2.8MB
MD5cce284cab135d9c0a2a64a7caec09107
SHA1e4b8f4b6cab18b9748f83e9fffd275ef5276199e
SHA25618aab0e981eee9e4ef8e15d4b003b14b3a1b0bfb7233fade8ee4b6a22a5abbb9
SHA512c45d021295871447ce60250ff9cbeba2b2a16a23371530da077d6235cfe5005f10fa228071542df3621462d913ad2f58236dc0c0cb390779eef86a10bba8429f
-
Filesize
4.5MB
MD533968a33f7e098d31920c07e56c66de2
SHA19c684a0dadae9f940dd40d8d037faa6addf22ddb
SHA2566364269dbdc73d638756c2078ecb1a39296ddd12b384d05121045f95d357d504
SHA51276ccf5f90c57915674e02bc9291b1c8956567573100f3633e1e9f1eaa5dbe518d13b29a9f8759440b1132ed897ff5a880bef395281b22aaf56ad9424a0e5e69a
-
Filesize
280B
MD5112ba0de5012e4a2f4d74c60bea926f0
SHA1ed4f0811af4da1e2f6a599ab2c2444ea21caa2a6
SHA25649ff30583ebe970e0333c1fa1202d34964049bda72a090c2761a3339088d60df
SHA5120495f22190777eea21f4065bbdc5ef9b9cc027bd19ed90627bef155633f3d3c360fbb1f33c3b25d62dcff4ae03b2dd84fdd3cf73a4e441da4c5f0c4bde4ce986