Overview
overview
7Static
static
3Iаuncher_v9.1.rar
windows11-21h2-x64
1License Te...ig.xml
windows11-21h2-x64
4License Te...NU.txt
windows11-21h2-x64
3SDK/Assemb...ce.txt
windows11-21h2-x64
3SDK/Assemb...MO.txt
windows11-21h2-x64
3SDK/Assemb...vc.txt
windows11-21h2-x64
3SDK/Assemb...fo.xml
windows11-21h2-x64
4SDK/Assemb...ed.xml
windows11-21h2-x64
4SDK/Assemb...mf.xml
windows11-21h2-x64
4SDK/Assemb...er.xml
windows11-21h2-x64
4SDK/Assemb...or.xml
windows11-21h2-x64
4SDK/Assemb...fc.xml
windows11-21h2-x64
4SDK/Assemb...ty.xml
windows11-21h2-x64
4SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...mo.xml
windows11-21h2-x64
4SDK/Assemb...ed.xml
windows11-21h2-x64
7SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...nt.xml
windows11-21h2-x64
4SDK/Assemb...es.dll
windows11-21h2-x64
1SDK/Assemb...es.dll
windows11-21h2-x64
1Shared/Mic...es.dll
windows11-21h2-x64
1Shared/Res...70.dll
windows11-21h2-x64
1Shared/Res...70.dll
windows11-21h2-x64
1Shared/instapi110.dll
windows11-21h2-x64
3Shared/sqldk.dll
windows11-21h2-x64
3Shared/sqllang.dll
windows11-21h2-x64
3Shared/sqllangsvc.dll
windows11-21h2-x64
3Shared/sqlos1.dll
windows11-21h2-x64
3Shared/sqltses.dll
windows11-21h2-x64
3Shared/xe.dll
windows11-21h2-x64
3Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
Iаuncher_v9.1.rar
Resource
win11-20250410-en
Behavioral task
behavioral2
Sample
License Terms/151/LocalDB/Binn/localdbxeventconfig.xml
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
License Terms/License_SQLNCLI_ENU.txt
Resource
win11-20250410-en
Behavioral task
behavioral4
Sample
SDK/Assemblies/Redist_TSqlLanguageService.txt
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
SDK/Assemblies/ru/License_SMO.txt
Resource
win11-20250410-en
Behavioral task
behavioral6
Sample
SDK/Assemblies/ru/License_TSqlLangSvc.txt
Resource
win11-20250410-en
Behavioral task
behavioral7
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.ConnectionInfo.xml
Resource
win11-20250410-en
Behavioral task
behavioral8
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.ConnectionInfoExtended.xml
Resource
win11-20250410-en
Behavioral task
behavioral9
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Dmf.xml
Resource
win11-20250410-en
Behavioral task
behavioral10
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.DmfSqlClrWrapper.xml
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.Collector.xml
Resource
win11-20250410-en
Behavioral task
behavioral12
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.Sdk.Sfc.xml
Resource
win11-20250410-en
Behavioral task
behavioral13
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.Utility.xml
Resource
win11-20250410-en
Behavioral task
behavioral14
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.UtilityEnum.xml
Resource
win11-20250410-en
Behavioral task
behavioral15
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.RegSvrEnum.xml
Resource
win11-20250410-en
Behavioral task
behavioral16
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.ServiceBrokerEnum.xml
Resource
win11-20250410-en
Behavioral task
behavioral17
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Smo.xml
Resource
win11-20250410-en
Behavioral task
behavioral18
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.SmoExtended.xml
Resource
win11-20250410-en
Behavioral task
behavioral19
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.SqlEnum.xml
Resource
win11-20250411-en
Behavioral task
behavioral20
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.SqlWmiManagement.xml
Resource
win11-20250410-en
Behavioral task
behavioral21
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.TransactSql.ScriptDom.Resources.dll
Resource
win11-20250410-en
Behavioral task
behavioral22
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Types.Resources.dll
Resource
win11-20250410-en
Behavioral task
behavioral23
Sample
Shared/Microsoft.SqlServer.Types.dll
Resource
win11-20250410-en
Behavioral task
behavioral24
Sample
Shared/Resources/1033/sqlevn70.dll
Resource
win11-20250410-en
Behavioral task
behavioral25
Sample
Shared/Resources/1049/sqlevn70.dll
Resource
win11-20250410-en
Behavioral task
behavioral26
Sample
Shared/instapi110.dll
Resource
win11-20250410-en
Behavioral task
behavioral27
Sample
Shared/sqldk.dll
Resource
win11-20250410-en
Behavioral task
behavioral28
Sample
Shared/sqllang.dll
Resource
win11-20250410-en
Behavioral task
behavioral29
Sample
Shared/sqllangsvc.dll
Resource
win11-20250410-en
Behavioral task
behavioral30
Sample
Shared/sqlos1.dll
Resource
win11-20250410-en
Behavioral task
behavioral31
Sample
Shared/sqltses.dll
Resource
win11-20250410-en
Behavioral task
behavioral32
Sample
Shared/xe.dll
Resource
win11-20250410-en
General
-
Target
SDK/Assemblies/ru/Microsoft.SqlServer.ConnectionInfo.xml
-
Size
173KB
-
MD5
405026dc487bd5fc0c3ee23fea55fd72
-
SHA1
545fc40823dda63fcd319bb301df7a17d23d3d08
-
SHA256
e42e07d5da0b682b1dbfed487bbb443fb50b9a52de67d4055c2182b3ea1061ad
-
SHA512
c7847f36ab567be85e0efa9f6330d9df38ab795acec7ff792e369407d71ad04505d12f443fbf3764e07c87ade8dcd7d754caa73bf93db900d3b9e211317e039a
-
SSDEEP
3072:6qvs0CSla1BLMGbOOO1RtXJxL7Fr2Qo3vVElaD7m7d:6qvCSla1BLMGbOOO1RtXJbrPMQ7
Malware Config
Signatures
-
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-cs.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-sq.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-gu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-nb.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-nl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-as.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-bg.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-ru.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-uk.hyb msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_1701164449\typosquatting_list.pb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_1701164449\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-ga.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-hi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-el.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_57473318\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-cu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-fr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-it.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-sv.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-af.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-de-1996.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-gl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-pa.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_1701164449\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-eu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-ka.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-te.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-en-gb.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_57473318\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-mn-cyrl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-tk.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_97216193\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-hy.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-lv.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-mr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-nn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_57473318\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-es.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-or.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-und-ethi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_97216193\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-de-1901.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-lt.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-pt.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-sl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-ta.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_97216193\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-bn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-cy.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-en-us.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-et.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-la.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_97216193\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-da.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-kn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-mul-ethi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-hu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_97216193\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-be.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4512_492822391\hyph-hr.hyb msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "2767300819" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\GPU\Revision = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\GPU\VendorId = "4318" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\HomepagesUpgradeVersion = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\GPU\SubSysId = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListDomainAttributeSet = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "13" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPMigrationVer = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "31175334" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\GPU\DeviceId = "140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\BrowserEmulation iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395196024" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133897013929461997" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4239789418-2672923313-1754393631-1000\{E3D49332-04AD-4835-AA57-59F7B0B0C1E1} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4008 wrote to memory of 3820 4008 MSOXMLED.EXE 79 PID 4008 wrote to memory of 3820 4008 MSOXMLED.EXE 79 PID 3820 wrote to memory of 4512 3820 iexplore.exe 82 PID 3820 wrote to memory of 4512 3820 iexplore.exe 82 PID 4512 wrote to memory of 4976 4512 msedge.exe 83 PID 4512 wrote to memory of 4976 4512 msedge.exe 83 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 4772 4512 msedge.exe 84 PID 4512 wrote to memory of 4772 4512 msedge.exe 84 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5012 4512 msedge.exe 85 PID 4512 wrote to memory of 5432 4512 msedge.exe 87 PID 4512 wrote to memory of 5432 4512 msedge.exe 87 PID 4512 wrote to memory of 5432 4512 msedge.exe 87 PID 4512 wrote to memory of 5432 4512 msedge.exe 87 PID 4512 wrote to memory of 5432 4512 msedge.exe 87
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\SDK\Assemblies\ru\Microsoft.SqlServer.ConnectionInfo.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SDK\Assemblies\ru\Microsoft.SqlServer.ConnectionInfo.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" -- "file:///C:/Users/Admin/AppData/Local/Temp/SDK/Assemblies/ru/Microsoft.SqlServer.ConnectionInfo.xml"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x2f4,0x7ffc26b0f208,0x7ffc26b0f214,0x7ffc26b0f2204⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1892,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=2324 /prefetch:114⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2184,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=2180 /prefetch:24⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2380,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=3004 /prefetch:134⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=3488 /prefetch:14⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3468,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:14⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4160,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=4916 /prefetch:144⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4404,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=4880 /prefetch:144⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5320,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=5312 /prefetch:144⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5744,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=5400 /prefetch:144⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5744,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=5400 /prefetch:144⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5376,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=5392 /prefetch:144⤵PID:6124
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11045⤵PID:5756
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5468,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=6044 /prefetch:144⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5384,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=5884 /prefetch:144⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5764,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=6100 /prefetch:144⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4968,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=4872 /prefetch:144⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5680,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=5436 /prefetch:144⤵PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6156,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=5440 /prefetch:144⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5440,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=5956 /prefetch:144⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5036,i,6890434607231834096,15822639989337142524,262144 --variations-seed-version --mojo-platform-channel-handle=5436 /prefetch:144⤵PID:1116
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4492
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:2072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4656
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5e93f7a7e895750f95a2b42200b2f4406
SHA1eb9edc7a2f5aff5ae1ef937ec351ae1adc59034f
SHA25616af01493a8deae2d5884e7a0b4e4cf7f9b67a1c762e6479679500cda4ac928d
SHA512de7167f6575862feec3e02150f1ac00ac9daed7528f3edb6dadb42266a27530ada41f7e2094ade3feb970ca8745e3c02a18e364c0e9ce04dee177472c1f5420a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2KB
MD53dae012ffd60cbf6c52085d7855a22de
SHA1ceda893df7eadbbb6bd7d13fd8185353953f98c7
SHA256153c9c868c58fe928756234a6b760ae27e07b591b8357a9e6cee95b65673d149
SHA512c23e58af54bbc5db56c9600e5e7c1868bd6d1eef0b3cecac1debddfac611292ba96acf048672cb3381bcc405e7c7935ed9b7e2e891c7f4534fc17da7dd1fb896
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
15KB
MD52e1c28dd11a59705fac99f74e470b73e
SHA1ca08ec262f2cae8d8de5cdddb88edb8751897516
SHA256f3ddc0fffbd1ebe661cc52db5d727126cf4dc508727fc4e4c5753033f582cef5
SHA5121054aba7d444b578f3fbb93057fcf83d3e0ac37a5c05117c5dbd24f4d074f4eb9acab7b3dab301d7418de5f440d52365b8b70cd94edc062707a76a075ab7411a
-
Filesize
37KB
MD5c871d0e3b87acbd3baa1fc5b80bd019a
SHA1c9db6e19fbc29dff61d92c64d0f19cd4bc82e446
SHA256e9d55fc8a9504843186c9dde839f4fed8a177f09b7ca8d127f4d1dc2278b0b12
SHA51225014fc2d3a6bdf3ccc681ff3715d3ef835cd15f22971aa2619a4f2b29cd6eda0342e0716ec68c148ba9424924f5c86f1c6aa9cbeedc9f0d5651fdd04ae587b4
-
Filesize
22KB
MD55c826ae67c73ecf65e0a2c8ea9817e9f
SHA10d4b4a273c1dd769abc17d343636f2293e9107a9
SHA256ab83c9294f55ca79df7dd3b0d7edc1394d00f5488d4285ae1fe574dbd3eae3b3
SHA51220babd2d1a135ac62b19d4543ddea57ef43c638654604636cfbe46e562f54917dfb70656acbe826bb4dbe155e5b5a70e591ae2d383a314485a2f459ba1b4e5d7
-
Filesize
900B
MD51816c5ba0653faf8dcbe4ffe70a9f60e
SHA1def4b266e664b9b317d94aeb610e064c034fea0a
SHA25611a58c53eff7f7b2dda2936b5ee4ad45b215accca98d4dbf864d4d5fb8bb18c0
SHA512eb880e81185c78120ba29934301ffd36eb000dc3acb50656a11395de4519730b08b6e84ae56bf6ed38f0fdbdcb2018fa8843189786bc5354eb70e4f6fa13d899
-
Filesize
467B
MD5096e0104dfed725e617dc7cdac051b0a
SHA17405531d839e018ccd9405f07d4f5f7d7465a390
SHA256e8c38d0c4d2cf34b3b055905434d50199d72eeb62435eb56fe49a8c4e4f07460
SHA512065d00e058a1428d4fccd8ce0e7673c75c3e0b743ad8f155e6304241ebcb33c09bfe44dd1a5a6208f6cfeb7fc11bffc25f608ba0bc4746000794fa1b3e70aa97
-
Filesize
20KB
MD5cffbd3682c77ba4f49db324cde446096
SHA1986785878ab65bc5bcba7dbfd3b086e9b7303594
SHA25698f86fa9a72afc8614aaded55983cc6447b3f7bba770c90302506b7fafdaa84b
SHA5122545ee1c31eeef01fc91eaa7c20ae68015255b6b1bd5a6a32c0c839e40f14d110b473d21e2c5185fc7d5df3b39c5367556dd7a584a0c153d0f7fc6d59f88d8d3
-
Filesize
22KB
MD53f8927c365639daa9b2c270898e3cf9d
SHA1c8da31c97c56671c910d28010f754319f1d90fa6
SHA256fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2
SHA512d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72
-
Filesize
40KB
MD586c4d42ec056498c2f0790d91690cdfb
SHA1936811643e5acaca237c65b4b10ec224970a4f8e
SHA256759807e5084a356c0da0ee738b89545421c07e1be420fccf5a5bca9d5fe277bc
SHA512fb9591dadecfeec664b7fa9ee489f9e5a106ef36530b0e9fb146f5df16793610bc5a68ad5875a19ab4869ba9fec48f4f502a126e37c1f55178811f48202d648a
-
Filesize
41KB
MD56b41ed8035885a1385caf2aa5c29c53f
SHA13a636729fdf247850cfaf0e70793b8b021558762
SHA25647fefc9174f46a28fd1add9b4eb51cac11640c465cd64389b97639a75d2aa982
SHA512a5e307b3c9a57d1dcd42591a0677dc0cad9d987625a23589504d8eac311d671aa8e7618fd4ae81a3bfc6f14bf8b61365ad316ac5cf50c920084e1fb182fb24e9
-
Filesize
49KB
MD5144e24dfec800fdf16d34cc2cca628e9
SHA15bdfe1000558b5c6ccaae4436dd7413af864b443
SHA256c97a7139487e54054f8e9d68776fd2eac43ac990e51c7b17c4b447744b63a112
SHA512a8725a0d9c77fb2f1429de920c0b788c84bdd100412629efed6be781e0b26fdabecddfa335af86a286915a929e292e62da3ea7143465ed49515720d1fe280384
-
Filesize
54KB
MD50de8557813d3a133f5691be1beccbaf1
SHA10fddf0b2e9074807fa348feebede817678d12558
SHA256bc9373e7778416e151382c77083ebaf4aa507a7d600eb056f6eaa0de3319876c
SHA512a9f84f17b1161e11b3dcebd4132ab5dc724a8c3770b7448401a84d5fc8b524821b7a4dec76a33b239806578ea20e64b390e2a6ef04a4a0a9031bf49adee0777f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.4.21.1\typosquatting_list.pb
Filesize623KB
MD5b5467605f1d5600fe6d540ebbad3c3a7
SHA14c52cfde3375a6fee3c1bafc6deecf77015ab154
SHA256f58fec5a101bcd710e42c4df00fd8064805fbedcab030eddab6b636f9f5efce1
SHA5120554b2eade8dee9ed85f196530b9f45cb261e1232b3fe1f3c8f9bf584b9b0334f09f7c9d7ad8b9daa776d82bb71093c48e81bdc6fb1f3d7b7991b96875e696f5
-
Filesize
118B
MD503e6b705075692ba847a04282c612238
SHA1c49e349819bc7d2ce591fbae49377d11baebc943
SHA256afd2af664504604698242823a388751ca6e84102ab752716d3bf8b1e5440d24a
SHA51228920c512a7b0c505b87bb90692ce0188f78f43da487d4dffbbbcc7c05cf853e238ebcc01166a7e56f3d65f2372ff7b10502b8daac472b303529d2db77326a04
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1