Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe
Resource
win10v2004-20250314-en
General
-
Target
e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe
-
Size
9.6MB
-
MD5
6e9d2ef6a2146bb9ae5a5cf4d89759bb
-
SHA1
3eff5752741da1c8f786d07021cad8f1237c23e8
-
SHA256
e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d
-
SHA512
713362bc1d2b25f4a8ed695f30bd2d340a43df336cbc598d43fafb3f1505c35585ca8ebaa5dadcfb4a0cbab75abc32a33d1ab17b2aee5d1272c60549d5309e18
-
SSDEEP
196608:S3o9iCKRyyrUG5LO875QA++LsjNZuxzqCbcsf3KwUyHXpP9wcoAt7RXGR:ahfLxNa0L8Z2Pgsf3KwUy3JKcjtpGR
Malware Config
Signatures
-
Rms family
-
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5760 attrib.exe 4848 attrib.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation DiskServer.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation OpenDisk.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation DiskUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation DiskUpdate1.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation Build.exe -
Executes dropped EXE 16 IoCs
pid Process 5544 WORMIX~1.EXE 3792 Build.exe 4844 DiskServer.exe 2528 OpenDisk.exe 4436 File.exe 1032 File2.exe 1988 File3.exe 4832 DiskUpdate.exe 4156 DiskUpdate1.exe 220 sysdisk.exe 2460 sysdisk.exe 6084 sysdisk.exe 2204 sysdisk.exe 2436 volumedisk.exe 5776 volumedisk.exe 760 volumedisk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 5544 WORMIX~1.EXE 5544 WORMIX~1.EXE 5544 WORMIX~1.EXE 5544 WORMIX~1.EXE 5544 WORMIX~1.EXE 5544 WORMIX~1.EXE -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_586668461\typosquatting_list.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_1024896758\data.txt msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_1983079110\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_162224157\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_162224157\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_1024896758\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_1983079110\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_1983079110\typosquatting_list.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_162224157\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_162224157\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_162224157\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_586668461\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_586668461\safety_tips.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_586668461\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_586668461\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3776_1024896758\manifest.fingerprint msedge.exe -
Launches sc.exe 16 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3624 sc.exe 5752 sc.exe 808 sc.exe 4200 sc.exe 3116 sc.exe 5548 sc.exe 1180 sc.exe 1504 sc.exe 216 sc.exe 1664 sc.exe 1656 sc.exe 2000 sc.exe 2676 sc.exe 5772 sc.exe 1512 sc.exe 1448 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysdisk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language volumedisk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language File3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DiskUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language File2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysdisk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OpenDisk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WORMIX~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysdisk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DiskServer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language volumedisk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysdisk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language volumedisk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language File.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DiskUpdate1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 4092 taskkill.exe 4632 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133869763151144290" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{4014D993-CC84-4665-89CE-BD7FBCBD1FE6} msedge.exe -
Runs .reg file with regedit 2 IoCs
pid Process 6060 regedit.exe 5964 regedit.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 5544 WORMIX~1.EXE 5544 WORMIX~1.EXE 220 sysdisk.exe 220 sysdisk.exe 220 sysdisk.exe 220 sysdisk.exe 220 sysdisk.exe 220 sysdisk.exe 2460 sysdisk.exe 2460 sysdisk.exe 6084 sysdisk.exe 6084 sysdisk.exe 2204 sysdisk.exe 2204 sysdisk.exe 2204 sysdisk.exe 2204 sysdisk.exe 2204 sysdisk.exe 2204 sysdisk.exe 2436 volumedisk.exe 2436 volumedisk.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 760 volumedisk.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4092 taskkill.exe Token: SeDebugPrivilege 4632 taskkill.exe Token: SeDebugPrivilege 220 sysdisk.exe Token: SeDebugPrivilege 6084 sysdisk.exe Token: SeTakeOwnershipPrivilege 2204 sysdisk.exe Token: SeTcbPrivilege 2204 sysdisk.exe Token: SeTcbPrivilege 2204 sysdisk.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3776 msedge.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 5544 WORMIX~1.EXE 2528 OpenDisk.exe 4436 File.exe 1988 File3.exe 1032 File2.exe 4832 DiskUpdate.exe 4156 DiskUpdate1.exe 2848 cmd.exe 220 sysdisk.exe 220 sysdisk.exe 2460 sysdisk.exe 2460 sysdisk.exe 6084 sysdisk.exe 6084 sysdisk.exe 2204 sysdisk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5172 wrote to memory of 5544 5172 e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe 88 PID 5172 wrote to memory of 5544 5172 e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe 88 PID 5172 wrote to memory of 5544 5172 e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe 88 PID 5544 wrote to memory of 2888 5544 WORMIX~1.EXE 90 PID 5544 wrote to memory of 2888 5544 WORMIX~1.EXE 90 PID 5544 wrote to memory of 3776 5544 WORMIX~1.EXE 91 PID 5544 wrote to memory of 3776 5544 WORMIX~1.EXE 91 PID 3776 wrote to memory of 5292 3776 msedge.exe 92 PID 3776 wrote to memory of 5292 3776 msedge.exe 92 PID 5544 wrote to memory of 2716 5544 WORMIX~1.EXE 93 PID 5544 wrote to memory of 2716 5544 WORMIX~1.EXE 93 PID 3776 wrote to memory of 4232 3776 msedge.exe 94 PID 3776 wrote to memory of 4232 3776 msedge.exe 94 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 PID 3776 wrote to memory of 5232 3776 msedge.exe 95 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5760 attrib.exe 4848 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe"C:\Users\Admin\AppData\Local\Temp\e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5172 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WORMIX~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WORMIX~1.EXE2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pihack.ru/3⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/channel/UCXHydDzT9VCuMZscErPlw6w3⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2f0,0x7ffbc86df208,0x7ffbc86df214,0x7ffbc86df2204⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1636,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:34⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2228,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:24⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2024,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=2712 /prefetch:84⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3500,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:14⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3508,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:14⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4344,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:14⤵PID:6036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4640,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=4652 /prefetch:14⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=5276,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:14⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5456,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=5492 /prefetch:14⤵PID:5904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5624,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=5652 /prefetch:14⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5812,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=5232 /prefetch:84⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4184,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=4472 /prefetch:84⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5856,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=3484 /prefetch:84⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6128,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=6164 /prefetch:84⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6128,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=6164 /prefetch:84⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6400,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=6268 /prefetch:84⤵PID:6072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6604,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=6652 /prefetch:84⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6612,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=6524 /prefetch:84⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3756,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:84⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3432,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=6224 /prefetch:84⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4480,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=6708 /prefetch:84⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3724,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=5816 /prefetch:84⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6168,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=6700 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5460,i,5920697267797334136,9604290713230871097,262144 --variations-seed-version --mojo-platform-channel-handle=6264 /prefetch:84⤵PID:2932
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/user/MrMehasha3⤵PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Build.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Build.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3792 -
C:\ProgramData\WindowsVolume\DiskServer.exe"C:\ProgramData\WindowsVolume\DiskServer.exe" -p8347847347897893478928989437897878923⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4844 -
C:\ProgramData\WindowsVolume\OpenDisk.exe"C:\ProgramData\WindowsVolume\OpenDisk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\ProgramData\WindowsVolume\File.exe"C:\ProgramData\WindowsVolume\File.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4436
-
-
C:\ProgramData\WindowsVolume\File2.exe"C:\ProgramData\WindowsVolume\File2.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1032
-
-
C:\ProgramData\WindowsVolume\File3.exe"C:\ProgramData\WindowsVolume\File3.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1988
-
-
C:\ProgramData\WindowsVolume\DiskUpdate.exe"C:\ProgramData\WindowsVolume\DiskUpdate.exe" -p783478348934898942378347834787857889895435365⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4832 -
C:\ProgramData\WindowsVolume\DiskUpdate1.exe"C:\ProgramData\WindowsVolume\DiskUpdate1.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\WindowsVolume\DiskInstall.bat" "7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\ProgramData\WindowsVolume"8⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5760
-
-
C:\Windows\SysWOW64\sc.exesc stop RManService8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Windows\SysWOW64\sc.exesc stop VolumeDisk08⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3116
-
-
C:\Windows\SysWOW64\sc.exesc stop VDeviceCard8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5772
-
-
C:\Windows\SysWOW64\sc.exesc stop NPackStereo8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5548
-
-
C:\Windows\SysWOW64\sc.exesc stop ServiceWork8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\SysWOW64\sc.exesc stop IntelDriver8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3624
-
-
C:\Windows\SysWOW64\sc.exesc stop AMIHardware8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1656
-
-
C:\Windows\SysWOW64\sc.exesc delete RManService8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2000
-
-
C:\Windows\SysWOW64\sc.exesc delete VolumeDisk08⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5752
-
-
C:\Windows\SysWOW64\sc.exesc delete VDeviceCard8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1180
-
-
C:\Windows\SysWOW64\sc.exesc delete NPackStereo8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Windows\SysWOW64\sc.exesc delete ServiceWork8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2676
-
-
C:\Windows\SysWOW64\sc.exesc delete IntelDriver8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:808
-
-
C:\Windows\SysWOW64\sc.exesc delete AMIHardware8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im rfusclient.exe /f8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im rutserv.exe /f8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\SystemVolume0\SysHardDisk" /f8⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\ProgramData\WindowsVolume\config_set.reg"8⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:6060
-
-
C:\ProgramData\WindowsVolume\sysdisk.exe"C:\ProgramData\WindowsVolume\sysdisk.exe" /silentinstall8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:220
-
-
C:\ProgramData\WindowsVolume\sysdisk.exe"C:\ProgramData\WindowsVolume\sysdisk.exe" /firewall8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2460
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\ProgramData\WindowsVolume\config_set.reg"8⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:5964
-
-
C:\Windows\SysWOW64\sc.exesc failure VolumeDisk0 reset= 0 actions= restart/500/restart/500/restart/5008⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4200
-
-
C:\Windows\SysWOW64\sc.exesc config VolumeDisk0 obj= LocalSystem type= interact type= own8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:216
-
-
C:\ProgramData\WindowsVolume\sysdisk.exe"C:\ProgramData\WindowsVolume\sysdisk.exe" /start8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:6084
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\ProgramData\WindowsVolume\*.*"8⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4848
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2020
-
C:\ProgramData\WindowsVolume\sysdisk.exeC:\ProgramData\WindowsVolume\sysdisk.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\ProgramData\WindowsVolume\volumedisk.exeC:\ProgramData\WindowsVolume\volumedisk.exe /tray2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5776
-
-
C:\ProgramData\WindowsVolume\volumedisk.exeC:\ProgramData\WindowsVolume\volumedisk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\ProgramData\WindowsVolume\volumedisk.exeC:\ProgramData\WindowsVolume\volumedisk.exe /tray3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:760
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
118B
MD5395a738237cb5606743da99d5459bd59
SHA153a2e376dbba8020189b4d629d1ce452c43abc42
SHA2566a15b2c0969575a4ae419e8b0eedc7c5515c8ae3dd73771e431e484689684aac
SHA5120ac1112218d23328eb3cccf777c9bf7b0c31b71387fc620d0f91fec73994661021524ae66d8b81f26d1d7f4df8ac60c12f7852c72c65030d0c106a0ba773a8bb
-
Filesize
72B
MD5a30b19bb414d78fff00fc7855d6ed5fd
SHA12a6408f2829e964c578751bf29ec4f702412c11e
SHA2569811cd3e1fbf80feb6a52ad2141fc1096165a100c2d5846dd48f9ed612c6fc9f
SHA51266b6db60e9e6f3059d1a47db14f05d35587aa2019bc06e6cf352dfbb237d9dfe6dce7cb21c9127320a7fdca5b9d3eb21e799abe6a926ae51b5f62cf646c30490
-
Filesize
1KB
MD5a46bdedc1e6587433dc98119f338d175
SHA101334536e159f71bc5bc1e7b7a0e75490c169c36
SHA256604b240dd5e0ae92578c785bf46888b93307588f00af62cf6296b2f1c86eeb50
SHA512e8010ea23bb01e707342fab42fb3b73fc6f82d0abfdd0354f01ed68e7e05aafaed3991f7deb9bc368de3c36deec7dbc7e4fa4e1178134d9e941f0c77cb52a394
-
Filesize
283B
MD552d57e611e45ceae3107a9606c798df8
SHA1a559ee95833113e022c4e5116508641847e31dd3
SHA2561511fc19a2f4a670f7ced8ff7980bb0f8eb5ef840c0c116fc96ec3b241a588e7
SHA5121c86c712988c97fab61461dfd6cc67912d11e1816af8e96f7a2432a591097e1182b179be0555c80cfbedb9441beeac526398b54fac4f49af1fed7dde75030306
-
Filesize
4.6MB
MD53d93858f86cf6760fae7b7c708049637
SHA1b998ed10c7367b055bb745799fa373dafbea3d8e
SHA2561c1869c735c799eeaaacd2d4e2cd342c33071c5e327f8020ab2101750b8ec86f
SHA512696faeb9b76d2ad4e743b5528ce0592ac5f8c34365225c81e281eff98bab3bfd35573dc75912969dd3843ad87b3ac39c766108cb2764f8181ac5003a03a917ae
-
Filesize
4.3MB
MD574a2b8793fbffe747ec6beefa02635ba
SHA109361da432a79efc14a7376140c21b3105cf8a6d
SHA25658e7fe8f1a9e8588a88023ca39855a30a9451ce90ab107ec8c6f68dd8153fb62
SHA512b922243ee39e41716fe5cdce0c89c4ef246d9e2961eed9927a64c21d68a731a8dbbc7de1213eff5a394531379248fb117b496929c1629abb41bbaeb9dc836431
-
Filesize
384KB
MD501fce99ef71f219c297b99252ea31abb
SHA18f45a949b777f04aa47fc4db77eebdb24a2bcfb6
SHA2569ae4979cdec81bcd0dd3de8fad9df24e8bb110faf34a61194db56d476f85ea64
SHA51257b26d1c2a9bd49319e67ab75afdb753006c371ec27632b56abbd2ba5a2a88ac134d659360832e4d5a0ab963909eaca19024a2d5415eeb7ade3adc1f97dd8f71
-
Filesize
365B
MD51a18270fb3fd76df0d01087e99dddcc6
SHA126732b781736ed80654e3a41839b50e3d2e36db5
SHA256fb9b9ae62c41448d117cbc468b2bf4eebb0665605cb864f28822f2b71f78dbda
SHA51263d260f4972c6a403af97c3c6e371f516a5d3fbc1090bfe2b41b4dd88ff900b98217fb2225b53948fc480c33d1b9753bbf1e4a4df1613069f0f211a556a95f19
-
Filesize
564KB
MD509db93f15dc76aebd31d6e7a081e3649
SHA1ad354b445fbcffaa8fee0024d6b7a6b0aff3540a
SHA256d3656c2455709d6ac688d423b05e98a1269e8274d49787db78bec7c5bdc27b12
SHA51254a6c0eedbddf84c3f776fb833a4757d4c01058bb593b22f8cac166e52a049ad84fcba9e423e1d418c4b780e10bec9338476f804dc8ad4233c4b5857b05bde8b
-
Filesize
2.1MB
MD5195b78d84c914c7691cd22f9f2f66e86
SHA17d93b4ef14e1a06f27d00fd03eed82531103d872
SHA256244626a00b53706a89645f5b94049d6ea73bc2566e34b579d8e22955f02bf459
SHA512dfb28aa74803e2bffee00224f395b51e6ed030f5a2c24feb109a4d10e9f6f99c94d43a9c6aeeb70774f9f07fcaa516a248c86572fb984f6c8dcbe6dbcafc255c
-
Filesize
375KB
MD533fe1f9da3970f862da541a2547e8a57
SHA117f09e35174d44cdb8c38833f497d4f51368ac01
SHA2567b02abfefdc990f7381f3db107a8169d21582735959ba8e764a195ab5edfee06
SHA5120a745059fea9d90735e30f7876b104c35d062f928f8108d502ec2fb00ef4660d26c284a9428460296125a703655bfed5822dcb27c39f17f902c7291ebd8e8e4a
-
Filesize
12KB
MD5560e095ba5d4fe2f486da25f428c4ecd
SHA1daee776fa0b6691013520545f02a942c346e8e63
SHA256bcbdccc5ae83261e46493ecd383c5942cf0d013161e5d5ebcde18818db46b0fe
SHA512a3c508daadab65f1430697b6b24e6f2368553b0b5e7c73833508adeb05621b645887bc373c4d3a7bd29ebe61aa188d078c994c1a50b8870ee3847b70ba6da30a
-
Filesize
48KB
MD5e44e34bc285b709f08f967325d9c8be1
SHA1e73f05c6a980ec9d006930c5343955f89579b409
SHA2561d99a7b5f7b3daa61fa773972b1e335aa09b92411484f6ddc99d2b2894455a5b
SHA512576b292b6e9cf022822443e050994462a6cbd9a3c60063bae9f54c78a84e75e17bb5eddf7e259a22a9d93f757cb6536c503762e2a30e75091e40c2756cde8727
-
Filesize
6.0MB
MD5d0d98989f5fe001826d2b09a5303d844
SHA17311c310fc25c6e74d88aeebe64556c6f24a1996
SHA256b102ea797e42bc804d7d9387107c8de633f5e45b5af654ae42ec0fc553fd9110
SHA5128ead40caa2bf07bfc14eb0a617ea259be3e5cd9d8d3796ca3c0a452d7d17f7a8750d176115c685ba6364057771c44b3715d2fe9a30bab5e72c99c6fe980cccec
-
Filesize
5.1MB
MD58969782b82398387c46fb9887bf9850d
SHA19f927e2acfb6282f24f7221ce5451055f930b47f
SHA25632d376d67fde458455e83272e7cef91ad39917a3f568b045f8975ca0ade33051
SHA5121790c2d4874584bb24f865dfd57f9f090142e4007b4ad659d1320b918879cc4dc9e05e68cf8ba8cb17a2b87aa232f70bcfd2597404a5c4a5c80497e4d4100c21
-
Filesize
378KB
MD5d43fa82fab5337ce20ad14650085c5d9
SHA1678aa092075ff65b6815ffc2d8fdc23af8425981
SHA256c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b
SHA512103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d
-
Filesize
1.6MB
MD5dab4646806dfca6d0e0b4d80fa9209d6
SHA18244dfe22ec2090eee89dad103e6b2002059d16a
SHA256cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587
SHA512aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD57a29c9592b301c8a1e945c1935b260e7
SHA100928262c5a16dc1b45e3317356bef8c388f34cc
SHA2569e4e819d0a3c90bffa7a883aceb6638f89c17cb17964412b98406f1be1b7ada6
SHA512eaa59cef8f4e96a58be69102c0216d774092356d4088f7e790fe508c0b82b3fb2ba30c97850e1f6b8248cb38aa1bcab5f241a17db90757c400bb844cea724916
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57dc75.TMP
Filesize3KB
MD5f9af10c6a8b5da0e7e3b3753bf52f8af
SHA1f9f9dd3419cdc05a23733bb95b132f3d2bd59a61
SHA256089a3963b34187cc45bc9f18dd579e887bea37452eb00b8d6c88440d483ccccd
SHA512146c19a12f818683dec117ff0d371bc98ab0cd348b0604bc7675559bc65b2e07dd7c835d54a0b87c9bc53073e4b066276139954d256278ce20d1d02b97ae6eeb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
3KB
MD52b6a379e61d7820bee761b7bab76b3e4
SHA1d85c2212ddbc4a51488c58ab8dbfece0fbbfc7be
SHA2569fbbc471c50e7f49f47ad72a10fd45e4edf27a2f424a24fc8412202f512a3a74
SHA512ce77210c9f09ac335aafa39624a437ddfbcd15c1601741f81bd95c5f7f96543e8d124fe0785b2cbb1265f9fd000753bf809012ae8b82fd65bacc42495e57e3db
-
Filesize
3KB
MD588b20b6546546accac9ccafd981ed072
SHA1c6c0bcc66328cb0ff03f9083ef0130f6a89edbdc
SHA256b6ba6a96d37cc731060db8a3712d6f9718c629b0fa11121446bc4ec595bf80b7
SHA5126e7bf1d5eb2c7607516f0c748863ee7e37a9dc8345c17f80e44a61445d68558fcb8f31e7c194935110fc2e11f0eff4f02fd4194ce71c1147a0efcc383ba97b3d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5298ace974cd4d75aab492255673758a7
SHA105c21f2fd29a20a8cc653bb05dff0369f9042013
SHA2565369ea809f476cbce36b3ca9f73d7d30ab72538e68e5f5dcb0de23e334e5b0c7
SHA512f1333c5f503b47c8fc43e0998b1a6ee9ab381603c56a73bb9b74c092e983b563b84e194c90608fa076092b8481f35ea832134baf54bf36f939bd4e4bf1034fc8
-
Filesize
17KB
MD55de039f688d1f481f30005cbc86c98e9
SHA142f982191236dce205827de8f2fd9eea2e8aabb8
SHA25656e738aa64416a13a1e2289fd1c4eb15562728b2adcee089c5f26ed5b767862a
SHA512e23650c35eaac29bea718ad9b3be9785ec2b53efe37eb4eb707ed500f38c406b4c386343bc377ee82221e9383e604b0f3029a1cca4506007714bd0258f238c9d
-
Filesize
36KB
MD5d83d7072a9db76ce691274217240f83d
SHA12ff59cdd7beb72cec7bb1fa1ea4e0579463d074a
SHA2560902315ada2a1e81dcedfc75c7a848c36d80c286622db6186676e9a69c2d0f3f
SHA512765e2f70a6ee90629410e8725ed5f3f55ca9b8e7f4b30c860f21772501482ee695cf9b6b177cc203d88cf92b71bda62d13acd553c00ad56d8f14465fc1d6ebe4
-
Filesize
23KB
MD5baf3bc399585efe24b376d283aa7bf0f
SHA12d8d0250128a3d8814d8a95347510ea92a0973c8
SHA25610c8cee120ed8a6ae76a9b8553f659029493b03777fb43227c2a8d743fe0ac6a
SHA5127e539d7a4c410d212ca55b8974283a0de949be7a21a9fd4eb8f6db5c2912464357e6fccdb2e19e8713183d1e70b2a2515d5aae2b9fdde5b21a3c00e768de7558
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
469B
MD516d7bd50d18668c55ed0079b11345c30
SHA1bcd0d39081e1d57e7313d75415cd883547f4fb04
SHA25693c5aa4932d96333d287834ef4333ee259c46b026bdeea977119bcffa7f4412c
SHA51260db188aa728feccd7abf19928f72f7e12874bb3f2e1c2ca400675025a3b4730af11ab4ec4677dcd8774942bb40425ecbbf4938dd2571451d01fbfff662d8b54
-
Filesize
22KB
MD5a6c67574d2b656466a73630942eb6945
SHA1f1f62b024fbf0ea70acb42cbb8ee0ce0e15ac8c5
SHA256a54e98ef44ba96a178b2868a7c4744626e23f4af23354a368a7a8f8bf3f7ce4a
SHA5122ffb1fb542303b874556f9c4638c03a864415f2b1a1255d4428edca474ae5821c4a44eb2376de52db25483191097e458efaf8de5dfbc7afac6baf0583310e547
-
Filesize
904B
MD5b500d9d044f9b2f3994a007083e65296
SHA131648bd7184cefb345469bc0cf78459116c47d46
SHA256a8727fed05a4edf2aed160c50052f04d07b5ced98082b27d9ef59d7b9783d06e
SHA512420aec1a36982f047aad35c715759d0d5fffdf4d944539aaa2cddf88c17bb113b42abe3fe0a9de7be32da7a82dd635190df846a35db1f76bd2fa56b20549c3d4
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD56da6e041e5b1e650ff8d20608528c395
SHA1116ac13193a776a8bf14c2a6fd806dee1afebef7
SHA256acbc1dcbad922724df0e0dd5270c4ff29bef2ac210ccff19bf2c80255261b69a
SHA512003be876f1a9c09a9dda0c098144f672ddfd293a4f774c910e28acbb05f0b54a34a0e4e62bcd59ec53587ca5f83f447790af5fefa3f50de6627e7d33b6c3d9f3
-
Filesize
40KB
MD54282ff23bbf48d327949cef51bd3cd53
SHA10e608a94f671a24442e410a7c877896a1d496073
SHA2567e228c9f5b092b05b784cf27901e9e42d5e42d24e66b33c7f78114fdc5258fc5
SHA51235051505adc95bb29d91a9f29358a06f7bec0fe162119463ea674440b908fa18ffbd8362e268f0c1823d66db23504d925ec5a8ed466ac54ee709aa3e8354c7b1
-
Filesize
54KB
MD538a46f0bb3a294ff5a25647f00e1f9b6
SHA130329119b62bed866f52e53b896e200161641db6
SHA2566852b20d7782dcf4b450d682b330234d2fa65186ee62e2fad59ccb4d4aa031a2
SHA5124cbf983e43a16f084fbfd230940ca9d4f1282b37c499976c75d196dcacbe5961d3f0857ad63a33562eed667534ec6feff9a1e51edac2cf9d70290cf5d386a808
-
Filesize
49KB
MD56f2236dabe002bbe56163a3b48d6ec28
SHA1bbc7e534e90c5002fc300e5c719702b520f30164
SHA256aeced7b3291c57acf2dac8628805026807dc8894eb79ea4609bc36b25f82d771
SHA512d6d811afa4a131749ae5de8523b0428c5d7cbb15b62e87ef08a7416c836c050abc67a82255cd080662352c0dd53c5f6c6413daadc29a0647d1950782f40c626a
-
Filesize
163KB
MD5bd6846ffa7f4cf897b5323e4a5dcd551
SHA1a6596cdc8de199492791faa39ce6096cf39295cd
SHA256854b7eb22303ec3c920966732bc29f58140a82e1101dffe2702252af0f185666
SHA512aa19b278f7211ffaf16b14b59d509ce6b80708e2bb5af87d98848747de4cba13b6626135dd3ec7aabd51b4c2cfb46ed96800a520d2dae8af8105054b6cd40e0b
-
Filesize
3KB
MD517c10dbe88d84b9309e6d151923ce116
SHA19ad2553c061ddcc07e6f66ce4f9e30290c056bdf
SHA2563ad368c74c9bb5da4d4750866f16d361b0675a6b6dc4e06e2edd72488663450e
SHA512ad8ed3797941c9cad21ae2af03b77ce06a23931d9c059fe880935e2b07c08f85fc628e39873fb352c07714b4e44328799b264f4adb3513975add4e6b67e4a63c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.20.1\typosquatting_list.pb
Filesize638KB
MD5da8609745ded15c07f9b3b42a794f1bf
SHA16f51794da7f06ce1e79ea3e42a22f67d068525bc
SHA2567dd01720dc53471b5cfb185a9b1e39be94a095c53e5dc8a295818e425ca265c6
SHA512a04bd2845bd6df19cd59eb6d62be863ceffca5841f8c878c289364418a89e4b0f1efa4224f3fb0d10a010ce73a23a60e81e6d7437ec27da3541f085e22ac938b
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD562669811fa4d7c0c18bbe07c1ed2ae6f
SHA173362e47d9bb203b94f9c3837c2335aa3cb58270
SHA256dbe70899403a91cb6542cf5d046e81f3ef0ec940fb5c1d3aab9ad9b911e5267e
SHA5124243fbcec87e7efa8cfb6fff7e242b15757eb3a0487b7b21e1597b8fef56699047be87a5e20cd04daa4fdb45dd29ed7ca17e9b2fd9e1a6d07c4d75bcaff77438
-
Filesize
6.8MB
MD5bf1f50e79e91f2014b2a4ead463cd704
SHA1ca1e8962dd2d99bd7e19e65d7d697719dfcdf350
SHA256ab7c6026d4265002ae623b0e2ebe40279e6609c70943fe3eab867c2a2c61fd2f
SHA5120776cfeb8e5909703acc4a48439d2d90b9433341c336a8df10bf3d32af31ab66bff55c1fa4cdf0d7821c1942fdc18bf7709d03555efc63029567a75991bed918
-
Filesize
2.9MB
MD536cb128085970809b44d1691dd79ce6b
SHA1713bf4d7c2051c71bb5cb244ca05e85c9af6973a
SHA256273a0b1560194f7eb3a765604f2758dd691ac09caa63cad021ce5ad58cc70413
SHA512208ac202bfdce1dc54a78535472b4a76729884b20750a01d2cbf44ffafe0f035901a26dee80a5cc197adf9eba9f5a631aa0881782a6e06c79794d9ea89e2b18f