Overview
overview
7Static
static
3Iаuncher_v9.1.rar
windows11-21h2-x64
1License Te...ig.xml
windows11-21h2-x64
4License Te...NU.txt
windows11-21h2-x64
3SDK/Assemb...ce.txt
windows11-21h2-x64
3SDK/Assemb...MO.txt
windows11-21h2-x64
3SDK/Assemb...vc.txt
windows11-21h2-x64
3SDK/Assemb...fo.xml
windows11-21h2-x64
4SDK/Assemb...ed.xml
windows11-21h2-x64
4SDK/Assemb...mf.xml
windows11-21h2-x64
4SDK/Assemb...er.xml
windows11-21h2-x64
4SDK/Assemb...or.xml
windows11-21h2-x64
4SDK/Assemb...fc.xml
windows11-21h2-x64
4SDK/Assemb...ty.xml
windows11-21h2-x64
4SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...mo.xml
windows11-21h2-x64
4SDK/Assemb...ed.xml
windows11-21h2-x64
7SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...nt.xml
windows11-21h2-x64
4SDK/Assemb...es.dll
windows11-21h2-x64
1SDK/Assemb...es.dll
windows11-21h2-x64
1Shared/Mic...es.dll
windows11-21h2-x64
1Shared/Res...70.dll
windows11-21h2-x64
1Shared/Res...70.dll
windows11-21h2-x64
1Shared/instapi110.dll
windows11-21h2-x64
3Shared/sqldk.dll
windows11-21h2-x64
3Shared/sqllang.dll
windows11-21h2-x64
3Shared/sqllangsvc.dll
windows11-21h2-x64
3Shared/sqlos1.dll
windows11-21h2-x64
3Shared/sqltses.dll
windows11-21h2-x64
3Shared/xe.dll
windows11-21h2-x64
3Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
Iаuncher_v9.1.rar
Resource
win11-20250410-en
Behavioral task
behavioral2
Sample
License Terms/151/LocalDB/Binn/localdbxeventconfig.xml
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
License Terms/License_SQLNCLI_ENU.txt
Resource
win11-20250410-en
Behavioral task
behavioral4
Sample
SDK/Assemblies/Redist_TSqlLanguageService.txt
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
SDK/Assemblies/ru/License_SMO.txt
Resource
win11-20250410-en
Behavioral task
behavioral6
Sample
SDK/Assemblies/ru/License_TSqlLangSvc.txt
Resource
win11-20250410-en
Behavioral task
behavioral7
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.ConnectionInfo.xml
Resource
win11-20250410-en
Behavioral task
behavioral8
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.ConnectionInfoExtended.xml
Resource
win11-20250410-en
Behavioral task
behavioral9
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Dmf.xml
Resource
win11-20250410-en
Behavioral task
behavioral10
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.DmfSqlClrWrapper.xml
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.Collector.xml
Resource
win11-20250410-en
Behavioral task
behavioral12
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.Sdk.Sfc.xml
Resource
win11-20250410-en
Behavioral task
behavioral13
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.Utility.xml
Resource
win11-20250410-en
Behavioral task
behavioral14
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.UtilityEnum.xml
Resource
win11-20250410-en
Behavioral task
behavioral15
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.RegSvrEnum.xml
Resource
win11-20250410-en
Behavioral task
behavioral16
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.ServiceBrokerEnum.xml
Resource
win11-20250410-en
Behavioral task
behavioral17
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Smo.xml
Resource
win11-20250410-en
Behavioral task
behavioral18
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.SmoExtended.xml
Resource
win11-20250410-en
Behavioral task
behavioral19
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.SqlEnum.xml
Resource
win11-20250411-en
Behavioral task
behavioral20
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.SqlWmiManagement.xml
Resource
win11-20250410-en
Behavioral task
behavioral21
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.TransactSql.ScriptDom.Resources.dll
Resource
win11-20250410-en
Behavioral task
behavioral22
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Types.Resources.dll
Resource
win11-20250410-en
Behavioral task
behavioral23
Sample
Shared/Microsoft.SqlServer.Types.dll
Resource
win11-20250410-en
Behavioral task
behavioral24
Sample
Shared/Resources/1033/sqlevn70.dll
Resource
win11-20250410-en
Behavioral task
behavioral25
Sample
Shared/Resources/1049/sqlevn70.dll
Resource
win11-20250410-en
Behavioral task
behavioral26
Sample
Shared/instapi110.dll
Resource
win11-20250410-en
Behavioral task
behavioral27
Sample
Shared/sqldk.dll
Resource
win11-20250410-en
Behavioral task
behavioral28
Sample
Shared/sqllang.dll
Resource
win11-20250410-en
Behavioral task
behavioral29
Sample
Shared/sqllangsvc.dll
Resource
win11-20250410-en
Behavioral task
behavioral30
Sample
Shared/sqlos1.dll
Resource
win11-20250410-en
Behavioral task
behavioral31
Sample
Shared/sqltses.dll
Resource
win11-20250410-en
Behavioral task
behavioral32
Sample
Shared/xe.dll
Resource
win11-20250410-en
General
-
Target
SDK/Assemblies/ru/Microsoft.SqlServer.RegSvrEnum.xml
-
Size
37KB
-
MD5
ae0aea529c4de1c3588e0ad5c5cde555
-
SHA1
aea8b8c5d790112910f87d902cff28cd29bc47bc
-
SHA256
44a39b127b33cb8a2826dcdb405ff75478c8b2098ff5eb71aab24e0542bb6038
-
SHA512
01b17137669d200f81cdfe73b7ff144db80f9199ed66764bd1ba76ac7271c2bb488de3de4078cd21207c7eb055c65069d2daa32161abed2686b97f190e94c914
-
SSDEEP
192:9qzqeeqCqHqSq+v+SqTqOSqJq7fqgBWN+C6A45sim0wWbHW7P3EqzE6VhVCDsMRS:o7WV4s73PD/N+gVJxaAj
Malware Config
Signatures
-
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-te.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-hu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-sl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-tk.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-nl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-ta.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_340530305\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-es.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-eu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-hr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-el.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2056529736\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2056529736\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-cs.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-da.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-mul-ethi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-sv.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2056529736\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_340530305\deny_etld1_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_340530305\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_1564213605\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-de-1996.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-mr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-nb.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-sk.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_340530305\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_1564213605\typosquatting_list.pb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-af.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-as.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-uk.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2056529736\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-en-gb.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-fr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-gu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-it.hyb msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2056529736\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-gl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-lv.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-mn-cyrl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-kn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-ml.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-sq.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-de-1901.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-et.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-pa.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-ru.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-pt.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_1564213605\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-be.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-bn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-cy.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-en-us.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-hy.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-ka.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_340530305\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-de-ch-1901.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-hi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-la.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-und-ethi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5800_2047054352\hyph-cu.hyb msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU\DeviceId = "140" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU\SubSysId = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU\Revision = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListDomainAttributeSet = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395196024" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU\VendorId = "4318" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "13" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "688066007" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPMigrationVer = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\HomepagesUpgradeVersion = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "31175379" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133897013944003829" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4144164418-4152157973-2926181071-1000\{D51C00D6-E27C-410B-B5F6-B3D5EE1865F6} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 812 msedge.exe 812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 3988 4788 MSOXMLED.EXE 78 PID 4788 wrote to memory of 3988 4788 MSOXMLED.EXE 78 PID 3988 wrote to memory of 5800 3988 iexplore.exe 81 PID 3988 wrote to memory of 5800 3988 iexplore.exe 81 PID 5800 wrote to memory of 5204 5800 msedge.exe 82 PID 5800 wrote to memory of 5204 5800 msedge.exe 82 PID 5800 wrote to memory of 2368 5800 msedge.exe 83 PID 5800 wrote to memory of 2368 5800 msedge.exe 83 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 5216 5800 msedge.exe 84 PID 5800 wrote to memory of 2400 5800 msedge.exe 85 PID 5800 wrote to memory of 2400 5800 msedge.exe 85 PID 5800 wrote to memory of 2400 5800 msedge.exe 85 PID 5800 wrote to memory of 2400 5800 msedge.exe 85 PID 5800 wrote to memory of 2400 5800 msedge.exe 85
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\SDK\Assemblies\ru\Microsoft.SqlServer.RegSvrEnum.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SDK\Assemblies\ru\Microsoft.SqlServer.RegSvrEnum.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" -- "file:///C:/Users/Admin/AppData/Local/Temp/SDK/Assemblies/ru/Microsoft.SqlServer.RegSvrEnum.xml"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x350,0x7ff9f4dcf208,0x7ff9f4dcf214,0x7ff9f4dcf2204⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1852,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:114⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2124,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=2136 /prefetch:24⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2548,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=2696 /prefetch:134⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3380,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=3436 /prefetch:14⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3388,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:14⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4764,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=4916 /prefetch:144⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4632,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=4892 /prefetch:144⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5416,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5428 /prefetch:144⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5616,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5732 /prefetch:144⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5616,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5732 /prefetch:144⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5440,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5456 /prefetch:144⤵PID:5336
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11325⤵PID:2296
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5788,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5812 /prefetch:144⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5900,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5776 /prefetch:144⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5404,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5924 /prefetch:144⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4996,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5064 /prefetch:144⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4032,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5844 /prefetch:144⤵PID:128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6260,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5892 /prefetch:144⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=880,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=6224 /prefetch:144⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6296,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=3028 /prefetch:104⤵
- Suspicious behavior: EnumeratesProcesses
PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5460,i,270683957806890662,3986158769366495946,262144 --variations-seed-version --mojo-platform-channel-handle=5244 /prefetch:144⤵PID:5256
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4588
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1080
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD59e4597d6e9951c90f605fa4a330843b2
SHA1c9a4c72aba3b9584e03d0db43aee91e51094c369
SHA256272d838982199dc905b6eea7f57fc331c216efacab7d865cf427fa4972aff009
SHA512adbf3948d11ce019ee5a0e8971b7b08567c7a3de742e03274ae0bd868f64f4d09e93e91e38681b34eb017af7d4708e5484b776b9b3828715d05f35621423fe05
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2KB
MD599a8bc5da37a84364882f60479516743
SHA128c3b0460ce9a6e088aec212768cfc6b0ab8350e
SHA256ec86922c4f6824a9df4a45dae2eeb2c50e02c11c46019462ea299363e9421349
SHA5124dc5108e66e01929d22fc6c064cd163bae49232d573f8d09ac5b01754c1bae667074319ce28a579900898896325f5b0427769de939f3e5176a73de6672f7052b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
15KB
MD524d6bd7f914697d2201338c002e54056
SHA1cd6fbc8388398dcae78b96e4777e3a3bca564b2e
SHA256389875c201a9dbcac6328e63a195314e2cbcd96a52b5358b988d37a0e3a366a4
SHA512a968118cb90e2d4def387b392742154d88f1d192c5ed245ec95f72e4d822e17c7fc762d338e20495893bfd8ee3472a8300dcf591836924ae6822293a1bbe4541
-
Filesize
16KB
MD53ecce615ffe23dd0e42d17e79ff6dea2
SHA196c37e95a9cb72e8eacb036a2c9bf6c770d7f360
SHA2563209a431f1c3645c9a9af45f158d921c79675866f8d86d6859532115a4189fa2
SHA512c31a53a989754392b1ad7325ea0b52136fc70bc6bd88b808f7e970c5d219f8c8343a5c4053b32131df4af36ef884c2917032be9b3dec53918613fbdd77e3ec7d
-
Filesize
37KB
MD59b3c3ff9ffeb56b16fa5251f3e34fe39
SHA1a0c361bebfef3f29c8e102624673835b18a09a7d
SHA256844444a570567ddddbbe53f23868d40027ebacdbe54b8fdd2a751f48856ab1f6
SHA512ac1b374c5c3c1ca208b825b8a383996574cc50ac1ec52d54c8f9f46bed9faffb666d4918c902249f8c8d295bc46673ce7b145059081f2b3c3959cee81c5c43d1
-
Filesize
22KB
MD578c195aef4165add577d8241ea9740c8
SHA10c9ada312a7bd24c6b933d3cef52f41d5062737a
SHA25611428717d27082d9949d0f111f9300d32cac289b87ff2524feb934b53a4e5f90
SHA512dd48a42ef86ae027795de8c5ec4ce48fafb69a8d94b7dde048f64fa1b3d1b5f578059e72a2675a0b95686ec31c364dd84a22e9a864609428b7ebc1d51d73e8d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\959ddcc3-afe0-4326-9239-9ad6a05c74d5.tmp
Filesize22KB
MD53f8927c365639daa9b2c270898e3cf9d
SHA1c8da31c97c56671c910d28010f754319f1d90fa6
SHA256fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2
SHA512d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72
-
Filesize
467B
MD5b29becc12b3ce4a086322813f78ff5a8
SHA189abc4579c9038b0241158ba844a4d64f40011a7
SHA25641eae3e730fa9e0d350832cc2f503a657beb97eea3beeec3c35e06e4a1697c5b
SHA51270742ba434ccaee9e66bd30c5f4cd910937fb6489e58e06a2b0737999782ddc1e9700bbca5a0e625f1cf90034064aee153d5d29ceddbd1048348d3ec77f0e5f3
-
Filesize
900B
MD5b5cfa7dad9ca7f304f0b78c0e062ed60
SHA1e6bd1da9bf5cd3a237846536d19100ea0ae51406
SHA256cc3958af5f5497beff749af596cb2d7af91d2eb2ec10d9b8552eee17428a2d6b
SHA5122e29726ddaf70139bda03fafd84148fad131b2326671341cadac0d11ce4480303ce96e6bb4862da1983e7789f7cd513683648f4f3384e93f068cf4e73019281b
-
Filesize
20KB
MD50583fae4b6c223a34785ed342f95efc5
SHA17e8bf7287a4da9c7ef94b38c6c11c2c58cccfd1e
SHA256db14a7da021dbb1576185351c68907dc2839ae03c2a622c5014cc6467906a5a7
SHA512264b356757c0ccfa5153ba1c3e065af5f8c73a48419fa3ead6f6aa597b16ecfddff127f1d345406e2a54bdee2b6ae124add759d1f50a7173b6d72706b119537d
-
Filesize
54KB
MD5156cdb74e96df873df2f4ef8ce9f7e00
SHA12e3d298279ec58d02f473b41c6e90c1ce6d112f1
SHA256e4f64087a089edb38061a1cb85e4be69aace05cf4e65f6bd259bec99ed330b6a
SHA5127e51bf4720b69344421721737376aa05f99715ff65921ea0783d1fdee0db3cda2eb8db8e3f9d89ec5911921f5683d7ce45fedc3adcdc3ce7f3476fcd516776e5
-
Filesize
40KB
MD5ad5d094036bb6f9e937e61ba1cce9d48
SHA11e8f51debc8c46a185fa8a9f1655f5fba3e50ead
SHA2566f7bf30b80144d5e8652d76e6f787cf8dd736a32ee4c996762f1eb7e57604f69
SHA512b47a414b9fa135b84742f5be1aab08dd68262d195b54d7675abd4a54479025cc84df59ca1fdb4df44157744b5bb191f5e302476ac054921dfaaafad62872668f
-
Filesize
41KB
MD5dd44d2b05c2c67a94009a6b2bb1b9438
SHA160777a608de870ee770ea184df49d8349c4cf4d9
SHA256a236d763256b9cf9b66e4f270cf3e35db10d28ce95d65d2506e34f95e2ae9536
SHA512c72c2f1ef6cb80926cdb39033225e19081cb7209b3f5ea10e6541227f8c20756117b8e35ba770093639c7f71af2e59d8cb285b83c786569b44d7f75aff4cfb5c
-
Filesize
49KB
MD5b6b180681eea3b847dfd1276fc15568e
SHA1f900bca96b66bc7d3e0765539a5953f17d1f83b4
SHA2563d2fd9ae5822aaf9a5b273534e53765ac3df5edd29a497b8045410e0bfce755f
SHA51299d4727863ae11c068f1107f029e40d472535c52e436960f9871fb281ee7a44bd281cb125f7b030c789771f5f914daf5520862a377ec8aa8c6d114e62f5cf6e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.4.21.1\typosquatting_list.pb
Filesize623KB
MD5b5467605f1d5600fe6d540ebbad3c3a7
SHA14c52cfde3375a6fee3c1bafc6deecf77015ab154
SHA256f58fec5a101bcd710e42c4df00fd8064805fbedcab030eddab6b636f9f5efce1
SHA5120554b2eade8dee9ed85f196530b9f45cb261e1232b3fe1f3c8f9bf584b9b0334f09f7c9d7ad8b9daa776d82bb71093c48e81bdc6fb1f3d7b7991b96875e696f5
-
Filesize
118B
MD503e6b705075692ba847a04282c612238
SHA1c49e349819bc7d2ce591fbae49377d11baebc943
SHA256afd2af664504604698242823a388751ca6e84102ab752716d3bf8b1e5440d24a
SHA51228920c512a7b0c505b87bb90692ce0188f78f43da487d4dffbbbcc7c05cf853e238ebcc01166a7e56f3d65f2372ff7b10502b8daac472b303529d2db77326a04
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a