Resubmissions
06-10-2022 21:06
221006-zxrwaaaga6 1013-04-2021 12:47
210413-myxlaxh4ta 1012-04-2021 13:54
210412-6sz4v79f2x 10Analysis
-
max time kernel
1800s -
max time network
1779s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-04-2021 12:47
Static task
static1
URLScan task
urlscan1
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Behavioral task
behavioral1
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210410
Behavioral task
behavioral2
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win7v20210408
Behavioral task
behavioral3
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210410
Behavioral task
behavioral4
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210408
Behavioral task
behavioral5
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210410
Behavioral task
behavioral6
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210408
Behavioral task
behavioral7
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210410
Behavioral task
behavioral8
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210410
Behavioral task
behavioral9
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210408
General
-
Target
https://keygenit.com/d/3e16ccf432109nspn247.html
-
Sample
210413-myxlaxh4ta
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
raccoon
a6bfe7e504db71e25642b830fd9b2c4366cf882a
-
url4cnc
https://telete.in/j90dadarobin
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 21 IoCs
Processes:
keygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekey.exekeygen-step-4.exeSetup.exekey.exeD62D.tmp.exesetups.exeFull Version.exesetups.tmpaskinstall20.exefile.exemd2_2efs.exeBTRSetp.exegcttt.exejfiag3g_gg.exejfiag3g_gg.exejfiag3g_gg.exejfiag3g_gg.exepid process 4024 keygen-pr.exe 2300 keygen-step-1.exe 2088 keygen-step-2.exe 1728 keygen-step-3.exe 1164 key.exe 1952 keygen-step-4.exe 2884 Setup.exe 3848 key.exe 3832 D62D.tmp.exe 964 setups.exe 2292 Full Version.exe 3932 setups.tmp 4948 askinstall20.exe 5036 file.exe 4024 md2_2efs.exe 848 BTRSetp.exe 5676 gcttt.exe 5712 jfiag3g_gg.exe 5740 jfiag3g_gg.exe 1004 jfiag3g_gg.exe 2380 jfiag3g_gg.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setups.tmpkeygen-step-4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation keygen-step-4.exe -
Loads dropped DLL 13 IoCs
Processes:
setups.tmprundll32.exeD62D.tmp.exepid process 3932 setups.tmp 3932 setups.tmp 3932 setups.tmp 3932 setups.tmp 3932 setups.tmp 3932 setups.tmp 3932 setups.tmp 2268 rundll32.exe 3832 D62D.tmp.exe 3832 D62D.tmp.exe 3832 D62D.tmp.exe 3832 D62D.tmp.exe 3832 D62D.tmp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
gcttt.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gcttt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md2_2efs.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 154 ip-api.com -
Drops file in System32 directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\5IQ7PLWM.cookie svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\5IQ7PLWM.cookie svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
key.exesvchost.exedescription pid process target process PID 1164 set thread context of 3848 1164 key.exe key.exe PID 4016 set thread context of 4172 4016 svchost.exe svchost.exe -
Drops file in Program Files directory 4 IoCs
Processes:
Full Version.exedescription ioc process File created C:\Program Files\api-ms-win-crt-convert-l1-1-0.dll Full Version.exe File created C:\Program Files\unins0000.dat Full Version.exe File created C:\Program Files\unins0000.dll Full Version.exe File created C:\Program Files\unins0000.vbs Full Version.exe -
Drops file in Windows directory 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4656 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4672 taskkill.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 339704ea112ed701 iexplore.exe -
Processes:
iexplore.exeMicrosoftEdge.exeIEXPLORE.EXEbrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1059c1d66330d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30879843" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30879843" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3577532868" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad98e1c4c5c1f64cbad3c833b8884b2700000000020000000000106600000001000020000000a7e499e0cf45b57ec02714d9f5a2f54d2f77379bb0db647b42030edc2d79860f000000000e8000000002000020000000caa54bfaaef82c51ee817224e797571ffedeb88913687d3cd572e92199e46cee2000000002865dffa9801b4befe5251973470bec044d8a34f76d7819e6f37c82216557e040000000169f6f934706b19fc7e5473abe93941864880668e290015e440be51feacc4f659689c752fed12437a00c79c084128fc83b69ab6df104483d765c01b1a17b0fd1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "325083280" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad98e1c4c5c1f64cbad3c833b8884b2700000000020000000000106600000001000020000000d3fa8293b91a2b82721d9b18313dc842f1d0e280d15475efc8745a8d89a9dc3c000000000e8000000002000020000000e1c652c85a85a0cb3611ec2d508f67dacac9dc454ac8ea127ffaff6737467b00200000002cb38a9c15b1ea43c945e2a47a68e2be206179b6d26ea4d98a3348deefad05ef4000000098a0b378909ebdefce3e2e6fb051aa266c7e3c66a437305c784b9ef416f42d6b5b20dafc450243de6fc79f4c72dc8482056bed8f7af6d2acfc2b8308c3630826 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\RepId\PublicId = "{F471385A-349C-4B1A-8499-EEEC275E767E}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "325131866" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FFF06271-9C56-11EB-A11C-4E8E8FD83A77} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3588157425" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3577532868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30879843" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "325099874" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e3b7d66330d701 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Modifies data under HKEY_USERS 13 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exesvchost.exeMicrosoftEdgeCP.exesvchost.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.gab.ag\ = "10" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = a7084a0e6430d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gotporn.com\Total = "41" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "253" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\freebtc.online\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 301bd569d72dd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$MediaWiki MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\freebtc.online\Total = "282" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "1118" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{WW6060MI-ED3Y-MI7M-57W2-EJZ5M77G1X0K}\1 = "4548" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\freebtc.online\Total = "272" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\freebtc.online\ = "137" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "1044" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.onlinecasinoground.nl MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\cpm-ad.com\Total = "244" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6fc4e7ce6430d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\t.dtscout.com\ = "35" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\faucetbtc.online\Total = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{BBB0309D-3154-4E20-B6CC-8529F601C8BB}" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{QJ2559JN-BF7A-LM2A-20M4-JBF9M43Q7G3S} svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.gab.ag\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gab.ag\Total = "10" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 286b08816530d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\faucetbtc.online\Total = "129" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 301bd569d72dd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "584" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "862" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\faucetbtc.online\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\gab.ag MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 3148 PING.EXE 1728 PING.EXE 420 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
setups.tmprundll32.exesvchost.exekey.exejfiag3g_gg.exejfiag3g_gg.exejfiag3g_gg.exepid process 3932 setups.tmp 3932 setups.tmp 2268 rundll32.exe 2268 rundll32.exe 4016 svchost.exe 4016 svchost.exe 1164 key.exe 1164 key.exe 5740 jfiag3g_gg.exe 5740 jfiag3g_gg.exe 3932 setups.tmp 3932 setups.tmp 3932 setups.tmp 3932 setups.tmp 1004 jfiag3g_gg.exe 1004 jfiag3g_gg.exe 3932 setups.tmp 3932 setups.tmp 3932 setups.tmp 3932 setups.tmp 2380 jfiag3g_gg.exe 2380 jfiag3g_gg.exe 3932 setups.tmp 3932 setups.tmp -
Suspicious behavior: MapViewOfSection 31 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Setup.exerundll32.exesvchost.exesvchost.exeaskinstall20.exeMicrosoftEdge.exekey.exedescription pid process Token: SeDebugPrivilege 2884 Setup.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeTcbPrivilege 4016 svchost.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeDebugPrivilege 2268 rundll32.exe Token: SeAuditPrivilege 2424 svchost.exe Token: SeAuditPrivilege 2424 svchost.exe Token: SeCreateTokenPrivilege 4948 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 4948 askinstall20.exe Token: SeLockMemoryPrivilege 4948 askinstall20.exe Token: SeIncreaseQuotaPrivilege 4948 askinstall20.exe Token: SeMachineAccountPrivilege 4948 askinstall20.exe Token: SeTcbPrivilege 4948 askinstall20.exe Token: SeSecurityPrivilege 4948 askinstall20.exe Token: SeTakeOwnershipPrivilege 4948 askinstall20.exe Token: SeLoadDriverPrivilege 4948 askinstall20.exe Token: SeSystemProfilePrivilege 4948 askinstall20.exe Token: SeSystemtimePrivilege 4948 askinstall20.exe Token: SeProfSingleProcessPrivilege 4948 askinstall20.exe Token: SeIncBasePriorityPrivilege 4948 askinstall20.exe Token: SeCreatePagefilePrivilege 4948 askinstall20.exe Token: SeCreatePermanentPrivilege 4948 askinstall20.exe Token: SeBackupPrivilege 4948 askinstall20.exe Token: SeRestorePrivilege 4948 askinstall20.exe Token: SeShutdownPrivilege 4948 askinstall20.exe Token: SeDebugPrivilege 4948 askinstall20.exe Token: SeAuditPrivilege 4948 askinstall20.exe Token: SeSystemEnvironmentPrivilege 4948 askinstall20.exe Token: SeChangeNotifyPrivilege 4948 askinstall20.exe Token: SeRemoteShutdownPrivilege 4948 askinstall20.exe Token: SeUndockPrivilege 4948 askinstall20.exe Token: SeSyncAgentPrivilege 4948 askinstall20.exe Token: SeEnableDelegationPrivilege 4948 askinstall20.exe Token: SeManageVolumePrivilege 4948 askinstall20.exe Token: SeImpersonatePrivilege 4948 askinstall20.exe Token: SeCreateGlobalPrivilege 4948 askinstall20.exe Token: 31 4948 askinstall20.exe Token: 32 4948 askinstall20.exe Token: 33 4948 askinstall20.exe Token: 34 4948 askinstall20.exe Token: 35 4948 askinstall20.exe Token: SeDebugPrivilege 4496 MicrosoftEdge.exe Token: SeDebugPrivilege 4496 MicrosoftEdge.exe Token: SeDebugPrivilege 4496 MicrosoftEdge.exe Token: SeDebugPrivilege 4496 MicrosoftEdge.exe Token: SeImpersonatePrivilege 1164 key.exe Token: SeTcbPrivilege 1164 key.exe Token: SeChangeNotifyPrivilege 1164 key.exe Token: SeCreateTokenPrivilege 1164 key.exe Token: SeBackupPrivilege 1164 key.exe Token: SeRestorePrivilege 1164 key.exe Token: SeIncreaseQuotaPrivilege 1164 key.exe Token: SeAssignPrimaryTokenPrivilege 1164 key.exe Token: SeImpersonatePrivilege 1164 key.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 3016 iexplore.exe 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
iexplore.exeIEXPLORE.EXEMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3016 iexplore.exe 3016 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 4496 MicrosoftEdge.exe 4756 MicrosoftEdgeCP.exe 4756 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exeR_wipe_clean_11_serial_key_gen.execmd.exekeygen-pr.exekeygen-step-4.exekey.exePING.EXEcmd.execmd.exeSetup.exesetups.exedescription pid process target process PID 3016 wrote to memory of 2500 3016 iexplore.exe IEXPLORE.EXE PID 3016 wrote to memory of 2500 3016 iexplore.exe IEXPLORE.EXE PID 3016 wrote to memory of 2500 3016 iexplore.exe IEXPLORE.EXE PID 496 wrote to memory of 984 496 R_wipe_clean_11_serial_key_gen.exe cmd.exe PID 496 wrote to memory of 984 496 R_wipe_clean_11_serial_key_gen.exe cmd.exe PID 496 wrote to memory of 984 496 R_wipe_clean_11_serial_key_gen.exe cmd.exe PID 984 wrote to memory of 4024 984 cmd.exe keygen-pr.exe PID 984 wrote to memory of 4024 984 cmd.exe keygen-pr.exe PID 984 wrote to memory of 4024 984 cmd.exe keygen-pr.exe PID 984 wrote to memory of 2300 984 cmd.exe keygen-step-1.exe PID 984 wrote to memory of 2300 984 cmd.exe keygen-step-1.exe PID 984 wrote to memory of 2300 984 cmd.exe keygen-step-1.exe PID 984 wrote to memory of 2088 984 cmd.exe keygen-step-2.exe PID 984 wrote to memory of 2088 984 cmd.exe keygen-step-2.exe PID 984 wrote to memory of 2088 984 cmd.exe keygen-step-2.exe PID 984 wrote to memory of 1728 984 cmd.exe keygen-step-3.exe PID 984 wrote to memory of 1728 984 cmd.exe keygen-step-3.exe PID 984 wrote to memory of 1728 984 cmd.exe keygen-step-3.exe PID 4024 wrote to memory of 1164 4024 keygen-pr.exe key.exe PID 4024 wrote to memory of 1164 4024 keygen-pr.exe key.exe PID 4024 wrote to memory of 1164 4024 keygen-pr.exe key.exe PID 984 wrote to memory of 1952 984 cmd.exe keygen-step-4.exe PID 984 wrote to memory of 1952 984 cmd.exe keygen-step-4.exe PID 984 wrote to memory of 1952 984 cmd.exe keygen-step-4.exe PID 1952 wrote to memory of 2884 1952 keygen-step-4.exe Setup.exe PID 1952 wrote to memory of 2884 1952 keygen-step-4.exe Setup.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1164 wrote to memory of 3848 1164 key.exe key.exe PID 1728 wrote to memory of 2768 1728 PING.EXE cmd.exe PID 1728 wrote to memory of 2768 1728 PING.EXE cmd.exe PID 1728 wrote to memory of 2768 1728 PING.EXE cmd.exe PID 2768 wrote to memory of 3148 2768 cmd.exe PING.EXE PID 2768 wrote to memory of 3148 2768 cmd.exe PING.EXE PID 2768 wrote to memory of 3148 2768 cmd.exe PING.EXE PID 2088 wrote to memory of 3832 2088 D62D.tmp.exe PID 2088 wrote to memory of 3832 2088 D62D.tmp.exe PID 2088 wrote to memory of 3832 2088 D62D.tmp.exe PID 2088 wrote to memory of 848 2088 cmd.exe PID 2088 wrote to memory of 848 2088 cmd.exe PID 2088 wrote to memory of 848 2088 cmd.exe PID 848 wrote to memory of 1728 848 cmd.exe PING.EXE PID 848 wrote to memory of 1728 848 cmd.exe PING.EXE PID 848 wrote to memory of 1728 848 cmd.exe PING.EXE PID 2884 wrote to memory of 964 2884 Setup.exe setups.exe PID 2884 wrote to memory of 964 2884 Setup.exe setups.exe PID 2884 wrote to memory of 964 2884 Setup.exe setups.exe PID 1952 wrote to memory of 2292 1952 keygen-step-4.exe Full Version.exe PID 1952 wrote to memory of 2292 1952 keygen-step-4.exe Full Version.exe PID 1952 wrote to memory of 2292 1952 keygen-step-4.exe Full Version.exe PID 964 wrote to memory of 3932 964 setups.exe setups.tmp PID 964 wrote to memory of 3932 964 setups.exe setups.tmp
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵PID:676
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1184
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1064
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1224
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1404
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:68
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2852
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
- Modifies registry class
PID:2740
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2724
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2432
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1820
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://keygenit.com/d/3e16ccf432109nspn247.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:4172
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Temp2_R_wipe_clean_11_serial_key_gen.zip\R_wipe_clean_11_serial_key_gen.exe"C:\Users\Admin\AppData\Local\Temp\Temp2_R_wipe_clean_11_serial_key_gen.zip\R_wipe_clean_11_serial_key_gen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Roaming\D62D.tmp.exe"C:\Users\Admin\AppData\Roaming\D62D.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3832 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\D62D.tmp.exe"5⤵PID:1208
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:4656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe" >> NUL4⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\XV4IGT5LML\setups.exe"C:\Users\Admin\AppData\Local\Temp\XV4IGT5LML\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\is-9K6SL.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-9K6SL.tmp\setups.tmp" /SL5="$602C2,726852,244736,C:\Users\Admin\AppData\Local\Temp\XV4IGT5LML\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Version.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2292 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins0000.vbs"5⤵PID:2184
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:4528
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵
- Executes dropped EXE
PID:5036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe" >> NUL5⤵PID:4620
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:420 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵
- Executes dropped EXE
PID:848 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5676 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
PID:5712 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5740 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4496
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4584
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4756
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2184
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4480
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4956
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5500
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5928
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4656
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5412
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2081⤵PID:4284
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3332
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:3692
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:3272
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4680
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4764
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1292
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:2288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b1fea024dd26bb61f24d14f74e21574c
SHA1750ecb662506d66fc5a8477ad9f92685f8c9e7ee
SHA2562038c6a04451ac48ad3cf25d95bb1bfded2d7b6d0b7c012dad70a71205ea71c9
SHA51278633190ac428fc5b8686ef14a36214d305e57dec6281bf70a1f02d918a3db1e54b30a3941312958b4db861c2ba37c61cc8880382dab3959f728b377ca9f1a86
-
MD5
466f323c95e55fe27ab923372dffff50
SHA1b2dc4328c22fd348223f22db5eca386177408214
SHA2566bfb49245a5a92113a71f731fc22fbb8397f836a123b3267196a2a4f8dd70c5c
SHA51260e242f873d76f77ec7486460d1181468ed060113f6331ab0a4bb540531e0526177819b1413edb316e1d133bd467cfcaacbbe6eb6f63f5b9a9777f50de39cbb6
-
MD5
6074e379e89c51463ee3a32ff955686a
SHA10c2772c9333bb1fe35b7e30584cefabdf29f71d1
SHA2563d4716dfe7a52575a064590797413b4d00f2366a77af43cf83b131ab43df145e
SHA5120522292e85b179727b62271763eecb23a2042f46023336034ae8f477cd25a65e12519582d08999116d193e6e105753685356b0244c451139a21d4174fb4f6933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD52887c0bf8c6b7602256a9c77fa48ce84
SHA1dc13f476a84e9871033a413c091fc56b925003c4
SHA2562eba39a8fb2d4b5407b8bc191fb13ba7879cd38611f79607547095e6a536dd46
SHA5126a943dfa098698ad49603b3f9915d06e57ad6440caa2af1e2077b1f4e40eef1f62c40a9053dedc3162a8ece1b776acb0fe85831821a903e9823525c8e983ab08
-
MD5
bd5a6a2d0c9328b5f14da28d995d2899
SHA1857ce8657c508207fa4e7abd11c770654c52ed24
SHA256d319f5b42825ea80a24f371ee6081a9454e655c5738fde7c89a199da23cb4644
SHA5128597622f6a63bedab2b409834e6ae1e6c3068692baad0794b5205f476a94c783f1bcef9aed50945fc9491487e3e363ca9efaf41dbb46af43abeba8b0c7827bb4
-
MD5
92aa63ba4cbfa0e1a463e9d0a9eff3fb
SHA17ea720c6dd74eedd2c5b6483e046f7994eb4d38c
SHA256c415a33cb490dbf41e7ca02472c1cc8db6e3039dccf4300efd93379beeeb87aa
SHA512cddb583329493cfc71e562ba8846e7d225ef7e87a14e084f0e913aaa969baef65162761cb501b405bd5aa31fb5508894c2d9e5f3775faf4f606ebab0b6c36de0
-
MD5
d1b1f562e42dd37c408c0a3c7ccfe189
SHA1c01e61a5c5f44fb038228b7e542f6a8d7c8c283d
SHA2567f468f04fe5a1b0616685f157a4285090b6ed3858d4cd9efe915aaeed83c158e
SHA512404d279fabd4886008e47e9138f799cf398f0aa4c8556192d6e45dbcde99eac2cd65c47b9e0b88bd6d3a6529818f6048a23a197a913fb917b19dffbbd5d75850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
MD592b990209682cc77ed43cd2e3b0dbb61
SHA1be61b32b4ee38fd6754286fb9018ba1a06259534
SHA2560c899d7123343b133b33441e4bfc3a07136680755e8d5177da56df74f3ade6d7
SHA51243f0a15f76f88d3c51cac576543b2725bd41e8a456ac5ef928ceb068560ce5c9297b5f4af7d99e82d25e59123f066bc3d1c0602372c4f4e090f4e6c173329355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD507248ac80408a7afb4f9e2bc0bc0f791
SHA153410ca173f4ab89dbc28ae7b770549ccb974722
SHA256a8ba39a70870bf4ae42dff59b888d8203c2b1f95ccd2d8d9f981ebcb283201b2
SHA512fdec4c6471546880276447ee9e371eed385d30fae76a3d1e736568caae04b275996cbeed793468d34a199fc22826b5f1398fa5f44567819191acc22a30abd8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD532257fe74344545e15ec54e288c5c879
SHA1e4e249a331b3169584f025526a70e15c6ae36bd6
SHA2561f8b537c8e0a0dfce4a773eb94f4aeb1145925404af906467609ea7aec552de8
SHA512fa20dddaded386f8d297541da7224d811ac8d255fdb7f5b7d3244adae81770cdb9b51d47a629247607076e09048c9eab637843aa09d34d9cf488fccb85beceda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\59D1C89B35882FB67B19C498B4BDBDE0
MD5906b2fa977bec0f1439cfeef46645d51
SHA1f87b62498efb78c4b7fd3a671634d3d8ebc807a4
SHA256c91df80e2b13ade023462d3d1c37e91587d6f179be618a62a05a2b261a87feeb
SHA5126be96c5067ff8d50514c00ec93b15ab4c14d76d498faf94deef9467a5af26ef25ff0b0ce2127c2f128745fcece980c3c379f9450381ffdd41d6cca86ffdedbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5EE9003E3DC4134E8CF26DC55FD926FA
MD57efe47a80247d7540089f2884f33c65b
SHA1f37d7bdfe781cdcad0eba77a3f27c5888d46638a
SHA256ce525970e0dcc7408909e9c091e4513f379cb121ad21d1260d6d29211f41935b
SHA5126ab9272cfb9b13870cda67db0264557a9a398afd88724b99c7ca4eba3a8499e8e186e4d07c0d8d478ae71426367ffd657ffb26c4537edbf129d25fabb46f377d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4
MD5b5c62669be74c997b4ffdfdd20a02a84
SHA18b9079b675a21b70f37dcd075db19b6cc71e2ccd
SHA25682d5c1c9cb40d7abb3f155a17edb6cf7630a8de9d8eec9432a887f969d0e91ce
SHA51277a05fd46db45efed5207114f6b0c9b2e63b718e336d3dddb520267cb973d38710177613d5d9fe08f2522fc4cdc7fdcca5b8c48d2c8ddd022016657bac211d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
MD5d7c25662b372db21a19d1a964854089d
SHA131a8e0636b0736538cefb99398cf2bf9908236ca
SHA2562b3529fab65acd9db05cfbcb2717f1919927057b8f528307d2231e4ba1d0ad8a
SHA512236a12c5a77873e799bccdc0bf35dad2b63fdc309886e13884f020e4848f456b59cf1b7363b8b8cf8fb5d9f432577656b8fd3d613e25550e33a6fb9c9aba9ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5527f25e89a2c1cb62b0dd48dc999620a
SHA12320ea8558a4b9edf7ed74afeacfaceaae8f3ac6
SHA2564b52f338b8fe2075b2002387073f9307b8f9ce062dbcb208787f3f318445e5eb
SHA512bdf7de489ce95afdfc4a631efe48d07c986b9bf5064b44de8778cc8b1c4080e985bf012d114bbb44835dc99d5e102aba477e57854221206837c329752f9820e5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GDGLHSEM\R_wipe_clean_11_serial_key_gen.zip.zzdkc5b.partial
MD5cb1aed7f6e6e2da8d19a70385bf45cd9
SHA1d4b23e70bdb9fbe7421b1c5f94cdcd8c073407c3
SHA25627c7d90e67ef3fa9aba791e97b0cdbd623e13b9f4e5a442dfbf0c05dcd7efee1
SHA51270ccadd614e2e43cd37dd80194ff3df0dfeb8fa8daf11e62bee88050d8399b7bca4280dc0e6e94c10e2fa552528910376b85c812666d97e78ce597636224871b
-
MD5
2c21cc17498ceb335f7ef29143795b96
SHA1c88c1e7534d6632045451b6c34e4e1f6b788aa7f
SHA256a8ccddb35ae2f7cff0b61c319c0707bbe0c0dae744ef4d8b852ee89d6ae9d825
SHA512f7b97af2efb4a09aff374379985a6b265fdac4d5ebda660739267a5abc1173ca47cd0bee0c855bcf25591659d448ae8cfca69f20bfec5e6e423402d2ec66821e
-
MD5
bf32c65b2a4960ce4d91672d41e9d93b
SHA1def15f7259d7049219c24fb3e196654c51f94812
SHA25632692685290605e0e86fa255e77d5afb2cbe502e2ec8a47edc2077ea4b84572b
SHA512a20cc220704a9ccc4d728f00fb3f1f4038033ebb2177ca8601942d0f54f216e1ccadbbeb753a05dd1d394d76ca95c116eaf4fd2ac23a4d408e8cfd8169c176f2
-
MD5
edc554629a7abe64369abc5789c8d374
SHA17185fbe31ec89da56c97d474ffc1331eba0b563d
SHA25685637ea5b7b69709aa3b46621bb855cc6eccddeb2368a5fb4c6d144ac00bd5aa
SHA512e41731c6ee7c5847807cc1dca425cc1d7a6a725da532a1db38187729ee9e81882f4fd7e1cc43c8da1e30dba7aa0cd7226b9e6d08ffb42f57fe5bf0420450fa82
-
MD5
aa18aee458369f4bea8bc55ada55f223
SHA11ddd9100cfb62c8154aec7e469b1ed9d38d1b9e6
SHA256b59c3a2d52fc993be77ed0e2407b068959ed42de24b761ea8d989efd7c0c24f4
SHA5123862120db18a4b93f7388d886224e08c82f0fbf251d5c569c08ab909723f2792a9295b3e5500c3bf6e9dade29e993398bf6a1345ef70a486244aa74f30c8250e
-
MD5
65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1a1f4784377c53151167965e0ff225f5085ebd43b
SHA256862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da
-
MD5
65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1a1f4784377c53151167965e0ff225f5085ebd43b
SHA256862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da
-
MD5
c615d0bfa727f494fee9ecb3f0acf563
SHA16c3509ae64abc299a7afa13552c4fe430071f087
SHA25695d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51
-
MD5
c615d0bfa727f494fee9ecb3f0acf563
SHA16c3509ae64abc299a7afa13552c4fe430071f087
SHA25695d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51
-
MD5
60290ece1dd50638640f092e9c992fd9
SHA1ed4c19916228dbbe3b48359a1da2bc2c78a0a162
SHA256b2df7da266e778e98107f64e0155071ac9e07ded4f556c7d7a3071dd5fbf5e06
SHA512928a2a951bb778b0d0a7ac681f66569bc9b707faf3878bf5f87b5b0ab117e34f6b846a5247bbb7aa2a086ecac8882b528a44be809e0900e177dae4b546dd32a4
-
MD5
60290ece1dd50638640f092e9c992fd9
SHA1ed4c19916228dbbe3b48359a1da2bc2c78a0a162
SHA256b2df7da266e778e98107f64e0155071ac9e07ded4f556c7d7a3071dd5fbf5e06
SHA512928a2a951bb778b0d0a7ac681f66569bc9b707faf3878bf5f87b5b0ab117e34f6b846a5247bbb7aa2a086ecac8882b528a44be809e0900e177dae4b546dd32a4
-
MD5
9aaafaed80038c9dcb3bb6a532e9d071
SHA14657521b9a50137db7b1e2e84193363a2ddbd74f
SHA256e019f9e9da75b4b108fd9a62853e5966d13a33fc13718b8248041204316edff5
SHA5129d69afc8c16ddc2261b46cc48e7ca2176e35a19534d82c6245baa6318b478fd63d1235a8418c07bf11cb5386aa0ee9879db90866b88251b16b959880d6ab0996
-
MD5
9aaafaed80038c9dcb3bb6a532e9d071
SHA14657521b9a50137db7b1e2e84193363a2ddbd74f
SHA256e019f9e9da75b4b108fd9a62853e5966d13a33fc13718b8248041204316edff5
SHA5129d69afc8c16ddc2261b46cc48e7ca2176e35a19534d82c6245baa6318b478fd63d1235a8418c07bf11cb5386aa0ee9879db90866b88251b16b959880d6ab0996
-
MD5
17bbc9824a04251d8159a52e6d13e6f8
SHA107379b2d353d55423417148a7f901d8d1613d20c
SHA256ebc9b8e75f19de7b6bde4539fe1c56e288080c01d8efd7498a9a71524b5c7171
SHA5120f94c0115506f2627f2cccdcf44cb57170f23f33cc45398ac95e917f66d79ffcf220c1923adb224799370140b65c85edf2f896cb6add31b2ba8217eb00cd63da
-
MD5
17bbc9824a04251d8159a52e6d13e6f8
SHA107379b2d353d55423417148a7f901d8d1613d20c
SHA256ebc9b8e75f19de7b6bde4539fe1c56e288080c01d8efd7498a9a71524b5c7171
SHA5120f94c0115506f2627f2cccdcf44cb57170f23f33cc45398ac95e917f66d79ffcf220c1923adb224799370140b65c85edf2f896cb6add31b2ba8217eb00cd63da
-
MD5
a12e7acce9c54e8f477830c938cd5bb7
SHA1482ac6ae9ea9ab1673e1444269bba2ef7a86794c
SHA256b5433a43058d8b81958e13064f7d5485b787d6812513600c27b913dc5c3b3bd0
SHA5125198b9b7f7ab17a0173a5eed18f3b1906ab3fc64da62cfb765ff43539acdcf3a0eafeefe6184f51f1fbebaacdb0bdf422572b4b3ba70de0b116c779f5e1b7174
-
MD5
12476321a502e943933e60cfb4429970
SHA1c71d293b84d03153a1bd13c560fca0f8857a95a7
SHA25614a0fbd7eab461e49ee161ac3bd9ad8055086dbe56848dbaba9ec2034b3dea29
SHA512f222de8febc705146394fd389e6cece95b077a0629e18eab91c49b139bf5b686435e28a6ada4a0dbb951fd24ec3db692e7a5584d57ffd0e851739e595f2bbfdc
-
MD5
51ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
MD5
51ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
MD5
51ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
MD5
ab2e63e044684969dbaaf1c0292372b3
SHA116031fd0e92373c422d9d54cbdd7bf4cbb78f3eb
SHA256c21609ccb04c5df4a3e4a87dd20aed7b4a87e399d6ea9a19e8cd8f15b32672a9
SHA512db733f9b7a4dab682fab849ea07e1f4791094f337c4ed9d79d72962353f18672dcfc3f19c08959aacb5e7a763ba1fd43b37a84312ef5dd574562016605081179
-
MD5
7becbb9f28e482145d7b02a893e04808
SHA148841d6fb6e3eabb825bc6dc18be4f467b655ecb
SHA25689c91ec22249d614611e1393f51cf0b496e1c129bb289694499ffacd40ab2519
SHA51211678378bca97557a4798165b5d0d4b0e2e1e4be7e24309173ec774eac23d2cb786690ce2bfaeb28d6d47d69ba904c468af90732c23cbce582cf84810132e3af
-
MD5
7becbb9f28e482145d7b02a893e04808
SHA148841d6fb6e3eabb825bc6dc18be4f467b655ecb
SHA25689c91ec22249d614611e1393f51cf0b496e1c129bb289694499ffacd40ab2519
SHA51211678378bca97557a4798165b5d0d4b0e2e1e4be7e24309173ec774eac23d2cb786690ce2bfaeb28d6d47d69ba904c468af90732c23cbce582cf84810132e3af
-
MD5
9852a5960fd257f8fb32fefd392fff6e
SHA1395c82e369964b35e006fd122e0895b3d8ea3126
SHA25695cac536659cb341775e07454f199c45968bf8ee16c7dfd4eb56a28af59d468d
SHA5129271dc3a39c27ee957aff2ce73c5cc2949e657f7380d43eb3e9b23911cc994f206a3e125465f2ebd94f6f8b029a12ce8f2a12fde02464e428fd47547ff442a85
-
MD5
9852a5960fd257f8fb32fefd392fff6e
SHA1395c82e369964b35e006fd122e0895b3d8ea3126
SHA25695cac536659cb341775e07454f199c45968bf8ee16c7dfd4eb56a28af59d468d
SHA5129271dc3a39c27ee957aff2ce73c5cc2949e657f7380d43eb3e9b23911cc994f206a3e125465f2ebd94f6f8b029a12ce8f2a12fde02464e428fd47547ff442a85
-
MD5
770db388eb963f0b9ba166ed47a57f8a
SHA1c5ecde1a0df48fa9baf7a04e746a6a3f702449a5
SHA256fa9c992bc426983ca13e878c670e23f87804e232fd6b6bac08c75b15d9c674f3
SHA51209b3c39dcb1bd2b568956aa3e2d05d127b3aa046dafb089b566972ff58343bc5875663da527cfcede3f141a1259893450267426b90231a8779f3379a037a60bd
-
MD5
770db388eb963f0b9ba166ed47a57f8a
SHA1c5ecde1a0df48fa9baf7a04e746a6a3f702449a5
SHA256fa9c992bc426983ca13e878c670e23f87804e232fd6b6bac08c75b15d9c674f3
SHA51209b3c39dcb1bd2b568956aa3e2d05d127b3aa046dafb089b566972ff58343bc5875663da527cfcede3f141a1259893450267426b90231a8779f3379a037a60bd
-
MD5
fdefd1e361d1020577bf018a5a98040c
SHA12d7c4cfa15f4cb29ce95e7a59c3089a081a772a2
SHA25601cb6ab274dc0ac90192b537a606965d98f03d99c95b3a0e24bc6cad724d42c7
SHA512adb42dc5cc31b95f6e3d463068d57480acb50c80ce49f4fabd0fa87700dda3d92afe543f2569f2e92077afd0d00869c5cdf24902968050132eccd9a230719378
-
MD5
fdefd1e361d1020577bf018a5a98040c
SHA12d7c4cfa15f4cb29ce95e7a59c3089a081a772a2
SHA25601cb6ab274dc0ac90192b537a606965d98f03d99c95b3a0e24bc6cad724d42c7
SHA512adb42dc5cc31b95f6e3d463068d57480acb50c80ce49f4fabd0fa87700dda3d92afe543f2569f2e92077afd0d00869c5cdf24902968050132eccd9a230719378
-
MD5
4302f044d74255ce3c7df8daa3a1c730
SHA12fd6a6339bdc321124431776d511913234e9ad0b
SHA256f1cbbde1c4c99b62c39b578f1e8754eea04f61a00ba72154790532e05009a450
SHA51231af00246f7fef0c775f0cbd56a3a55c717f644b50424b3d5cf1501bc50fb7afda7a138586615d8a3d595f28395510a09e62126ced58e55100a24158cf421557
-
MD5
4302f044d74255ce3c7df8daa3a1c730
SHA12fd6a6339bdc321124431776d511913234e9ad0b
SHA256f1cbbde1c4c99b62c39b578f1e8754eea04f61a00ba72154790532e05009a450
SHA51231af00246f7fef0c775f0cbd56a3a55c717f644b50424b3d5cf1501bc50fb7afda7a138586615d8a3d595f28395510a09e62126ced58e55100a24158cf421557
-
MD5
87df602f0776e8a13365d7cbb057653c
SHA1607a1b38721fe13ca39120f1951cb7aed40c8cde
SHA256ba079a42e09e80030910025a89c12cb91d86d969cfe6c4afcb7b5a8854c32fe1
SHA5125220eb1b79f145ec1ebfaffd0bbe7b0bacce8f6bcabdffe78c72fb5799639b4ce13196a653ccec9abc24cd8823dc475d1bfaa01d498c6a7f642b6be7547da541
-
MD5
87df602f0776e8a13365d7cbb057653c
SHA1607a1b38721fe13ca39120f1951cb7aed40c8cde
SHA256ba079a42e09e80030910025a89c12cb91d86d969cfe6c4afcb7b5a8854c32fe1
SHA5125220eb1b79f145ec1ebfaffd0bbe7b0bacce8f6bcabdffe78c72fb5799639b4ce13196a653ccec9abc24cd8823dc475d1bfaa01d498c6a7f642b6be7547da541
-
MD5
31c48e32ba1c6e13cfcb33eb404c7703
SHA1bb33aff0fa3991d7bc4ed8b2d1f44cb4ba3459ab
SHA256e61825676c044d3e7d07357eccf7825d027b163608b55c3a0f9a07f1eea0f92f
SHA51254f8bbd367c17ca82d4001f80e3c8184acc8e4d47f87fc61b173b4f47e71c4863af446179502bb206bcfc5e7bf91e48483e7dcb62c6a6158d5ca8b34ca65f7dd
-
MD5
f7dfaa9ef7e0070cdd11e3c8a2f858fc
SHA141860b33a18c5851a00907591b8680e5d9ea033d
SHA25681288234afd2c6b67639c810e0e3e00545273ba29a4f9369dcafe83fe1cf6bdb
SHA5124c34b349cea374c08f570ae5eec5785142b77dd95427c1320deb734f4528c273be4b06180af50b199072b6873eec10d62349f26235b24c0f1c7223992aec51a6
-
MD5
f7dfaa9ef7e0070cdd11e3c8a2f858fc
SHA141860b33a18c5851a00907591b8680e5d9ea033d
SHA25681288234afd2c6b67639c810e0e3e00545273ba29a4f9369dcafe83fe1cf6bdb
SHA5124c34b349cea374c08f570ae5eec5785142b77dd95427c1320deb734f4528c273be4b06180af50b199072b6873eec10d62349f26235b24c0f1c7223992aec51a6
-
MD5
466f323c95e55fe27ab923372dffff50
SHA1b2dc4328c22fd348223f22db5eca386177408214
SHA2566bfb49245a5a92113a71f731fc22fbb8397f836a123b3267196a2a4f8dd70c5c
SHA51260e242f873d76f77ec7486460d1181468ed060113f6331ab0a4bb540531e0526177819b1413edb316e1d133bd467cfcaacbbe6eb6f63f5b9a9777f50de39cbb6
-
MD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
MD5
eae9273f8cdcf9321c6c37c244773139
SHA18378e2a2f3635574c106eea8419b5eb00b8489b0
SHA256a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc
SHA51206e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097
-
MD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
MD5
4e8df049f3459fa94ab6ad387f3561ac
SHA106ed392bc29ad9d5fc05ee254c2625fd65925114
SHA25625a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871
SHA5123dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
MD5
77d6d961f71a8c558513bed6fd0ad6f1
SHA1122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a
SHA2565da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0
SHA512b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a
-
MD5
77d6d961f71a8c558513bed6fd0ad6f1
SHA1122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a
SHA2565da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0
SHA512b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d726d1db6c265703dcd79b29adc63f86
SHA1f471234fa142c8ece647122095f7ff8ea87cf423
SHA2560afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692
SHA5128cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4
-
MD5
d726d1db6c265703dcd79b29adc63f86
SHA1f471234fa142c8ece647122095f7ff8ea87cf423
SHA2560afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692
SHA5128cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4