Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
06-05-2021 07:52
Static task
static1
Behavioral task
behavioral1
Sample
ad94b98e49e2c5f974483313942e5968.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ad94b98e49e2c5f974483313942e5968.exe
Resource
win10v20210408
General
-
Target
ad94b98e49e2c5f974483313942e5968.exe
-
Size
888KB
-
MD5
4831c6d14c3a2135226c3e581bb4013f
-
SHA1
44a2ce6196d4467b6ae78a625d346f9008935630
-
SHA256
311e25c8370ed1c16a72cf163c48090f3e73495bc5fbc3a824635e9cc62f70e1
-
SHA512
c06db0e8e11f9d185f73a0e3786bc4b94904c532c3af50be0badc983d48b7aa66dec429e25de755bcfeadf371e48843f6531024acbd32afca9970991bc57da30
Malware Config
Extracted
remcos
sandshoe.myfirewall.org:2404
sandshoe.myfirewall.org:2415
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchosts.exesvchosts.exepid process 2548 svchosts.exe 1916 svchosts.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ad94b98e49e2c5f974483313942e5968.exesvchosts.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ad94b98e49e2c5f974483313942e5968.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\svchosts.exe\"" ad94b98e49e2c5f974483313942e5968.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ svchosts.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\svchosts.exe\"" svchosts.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
ad94b98e49e2c5f974483313942e5968.exesvchosts.exesvchosts.exedescription pid process target process PID 4024 set thread context of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 2548 set thread context of 1916 2548 svchosts.exe svchosts.exe PID 1916 set thread context of 3620 1916 svchosts.exe svchost.exe PID 1916 set thread context of 4172 1916 svchosts.exe svchost.exe PID 1916 set thread context of 4536 1916 svchosts.exe svchost.exe PID 1916 set thread context of 1168 1916 svchosts.exe svchost.exe PID 1916 set thread context of 4308 1916 svchosts.exe svchost.exe PID 1916 set thread context of 5496 1916 svchosts.exe svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
MicrosoftEdgeCP.exebrowser_broker.exeMicrosoftEdge.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exead94b98e49e2c5f974483313942e5968.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Pack = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000f3639a5debfebc153dca63efb494b311a3b0a73ccfe810e7589c3483bc6d1b459a3521c3f029d129f568ad8f9d57a69ba086595c2206e753b26334cde1b755de3778ed18f8011932db005014054aa06ca24f9b84e886755b1a90 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\microsoft.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\microsoft.com MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\docs.microsoft.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = e0bfee2c5e42d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings ad94b98e49e2c5f974483313942e5968.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\microsoft.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\microsoft.com MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\docs.microsoft.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\microsoft.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
ad94b98e49e2c5f974483313942e5968.exesvchosts.exepid process 4024 ad94b98e49e2c5f974483313942e5968.exe 4024 ad94b98e49e2c5f974483313942e5968.exe 4024 ad94b98e49e2c5f974483313942e5968.exe 2548 svchosts.exe 2548 svchosts.exe 2548 svchosts.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchosts.exepid process 1916 svchosts.exe -
Suspicious behavior: MapViewOfSection 22 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exepid process 2328 MicrosoftEdgeCP.exe 2328 MicrosoftEdgeCP.exe 2328 MicrosoftEdgeCP.exe 2328 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
ad94b98e49e2c5f974483313942e5968.exesvchosts.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription pid process Token: SeDebugPrivilege 4024 ad94b98e49e2c5f974483313942e5968.exe Token: SeDebugPrivilege 2548 svchosts.exe Token: SeDebugPrivilege 3172 MicrosoftEdge.exe Token: SeDebugPrivilege 3172 MicrosoftEdge.exe Token: SeDebugPrivilege 3172 MicrosoftEdge.exe Token: SeDebugPrivilege 3172 MicrosoftEdge.exe Token: SeDebugPrivilege 764 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 764 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 764 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 764 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3172 MicrosoftEdge.exe Token: SeDebugPrivilege 4600 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4600 MicrosoftEdgeCP.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
svchosts.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 1916 svchosts.exe 3172 MicrosoftEdge.exe 2328 MicrosoftEdgeCP.exe 2328 MicrosoftEdgeCP.exe 4780 MicrosoftEdge.exe 5020 MicrosoftEdgeCP.exe 5020 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ad94b98e49e2c5f974483313942e5968.exead94b98e49e2c5f974483313942e5968.exeWScript.execmd.exesvchosts.exesvchosts.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription pid process target process PID 4024 wrote to memory of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 4024 wrote to memory of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 4024 wrote to memory of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 4024 wrote to memory of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 4024 wrote to memory of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 4024 wrote to memory of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 4024 wrote to memory of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 4024 wrote to memory of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 4024 wrote to memory of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 4024 wrote to memory of 1216 4024 ad94b98e49e2c5f974483313942e5968.exe ad94b98e49e2c5f974483313942e5968.exe PID 1216 wrote to memory of 4032 1216 ad94b98e49e2c5f974483313942e5968.exe WScript.exe PID 1216 wrote to memory of 4032 1216 ad94b98e49e2c5f974483313942e5968.exe WScript.exe PID 1216 wrote to memory of 4032 1216 ad94b98e49e2c5f974483313942e5968.exe WScript.exe PID 4032 wrote to memory of 3888 4032 WScript.exe cmd.exe PID 4032 wrote to memory of 3888 4032 WScript.exe cmd.exe PID 4032 wrote to memory of 3888 4032 WScript.exe cmd.exe PID 3888 wrote to memory of 2548 3888 cmd.exe svchosts.exe PID 3888 wrote to memory of 2548 3888 cmd.exe svchosts.exe PID 3888 wrote to memory of 2548 3888 cmd.exe svchosts.exe PID 2548 wrote to memory of 1916 2548 svchosts.exe svchosts.exe PID 2548 wrote to memory of 1916 2548 svchosts.exe svchosts.exe PID 2548 wrote to memory of 1916 2548 svchosts.exe svchosts.exe PID 2548 wrote to memory of 1916 2548 svchosts.exe svchosts.exe PID 2548 wrote to memory of 1916 2548 svchosts.exe svchosts.exe PID 2548 wrote to memory of 1916 2548 svchosts.exe svchosts.exe PID 2548 wrote to memory of 1916 2548 svchosts.exe svchosts.exe PID 2548 wrote to memory of 1916 2548 svchosts.exe svchosts.exe PID 2548 wrote to memory of 1916 2548 svchosts.exe svchosts.exe PID 2548 wrote to memory of 1916 2548 svchosts.exe svchosts.exe PID 1916 wrote to memory of 3620 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 3620 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 3620 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 3620 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 3620 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 3620 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 3620 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 3620 1916 svchosts.exe svchost.exe PID 2328 wrote to memory of 764 2328 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2328 wrote to memory of 764 2328 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2328 wrote to memory of 764 2328 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1916 wrote to memory of 4172 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 4172 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 4172 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 4172 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 4172 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 4172 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 4172 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 4172 1916 svchosts.exe svchost.exe PID 2328 wrote to memory of 4212 2328 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2328 wrote to memory of 4212 2328 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2328 wrote to memory of 4212 2328 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2328 wrote to memory of 4212 2328 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5020 wrote to memory of 5088 5020 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5020 wrote to memory of 5088 5020 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5020 wrote to memory of 5088 5020 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5020 wrote to memory of 5088 5020 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5020 wrote to memory of 5088 5020 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5020 wrote to memory of 5088 5020 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5020 wrote to memory of 5088 5020 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5020 wrote to memory of 5088 5020 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5020 wrote to memory of 5088 5020 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5020 wrote to memory of 5088 5020 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1916 wrote to memory of 4536 1916 svchosts.exe svchost.exe PID 1916 wrote to memory of 4536 1916 svchosts.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad94b98e49e2c5f974483313942e5968.exe"C:\Users\Admin\AppData\Local\Temp\ad94b98e49e2c5f974483313942e5968.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ad94b98e49e2c5f974483313942e5968.exe"{path}"2⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\svchosts.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Remcos\svchosts.exeC:\Users\Admin\AppData\Roaming\Remcos\svchosts.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Remcos\svchosts.exe"{path}"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe7⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe7⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe7⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe7⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe7⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe7⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8FZJNG7Q\12971179[1].jpgMD5
0e4994ae0e03d9611e7655286675f156
SHA1e650534844a7197b328371318f288ae081448a97
SHA25607b979b12f1cb506df7675efe227a2e78accfa1f5954af2b7bb66295e5cf881c
SHA51207aaae5347fa8e82f86d0ba7c28127fac952d84bad3dce119654b5ba1cd2550c8d064770473f34f89fc383847b2f1594b3600d9fd01e6275d67868c41638e34a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8FZJNG7Q\24882762[1].jpgMD5
905e1cef9ad39a2d0cba0341cd1d56b7
SHA10d5c98207854ba27a8933b96a820235ced711ebb
SHA25662e14d112854a2b2b086741e52eb60713c2286cafdebdd576df02ed319aa931a
SHA5128aa59589d2e107dd8d91db8e38778e04de1e221aa8e2b8df0ae9f738030915e4bc0039584370552799184e5edd12f7183ca7d337dd8afa6fdb3e1b5ee7d522e5
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8FZJNG7Q\2672110[1].pngMD5
7dc91895d24c825c361387611f6593e9
SHA1fc0d26031ba690ac7748c759c35005fe627beb8f
SHA256f37ad9b56d806d06267f9a290196dfe4200edb7729b41d789b8f1ec8adc5cdbf
SHA512ba27fdbf02294cc78ede7972f20da383c20027ab172a4ea6ad5006ff58e404032d92f875e642dfe73985428c28bbbe1befc546c2666a672afacf23195425d7c2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8FZJNG7Q\SegoeUI-Roman-VF_web[1].woff2MD5
bca97218dca3cb15ce0284cbcb452890
SHA1635298cbbd72b74b1762acc7dad6c79de4b3670d
SHA25663c12051016796d92bcf4bc20b4881057475e6dfa4937c29c9e16054814ab47d
SHA5126e850842d1e353a5457262c5c78d20704e8bd24b532368ba5e5dfc7a4b63059d536296b597fd3ccbd541aa8f89083a79d50aaa1b5e65b4d23fc37bfd806f0545
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8FZJNG7Q\fetch.umd.min[1].jsMD5
426331495a2310e355c95c3cabb8cf94
SHA12ff04aec423d302524a0d613ac5f84eabacc87a3
SHA25650a4426a6989263c4fce8242ec99518acf9f216b88043c75d10c764bf732bf17
SHA512a669a8114de0e05fa0e3878aefa167d51c2c21bebcf2ea515c4487dc9a82f70e1b4f102c4c43d2703bb99cff2a2f95d9d76d34a6a5e86318efd79b88233ebb35
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8FZJNG7Q\template.min[1].jsMD5
6daed083086c521d306f7d9f77b8533b
SHA1ba854384cd7984635159f57c52707fb8bb8d3b63
SHA256b1421ef2407b4f269d9e9083a99cf3219ff24bede5deac557aaf60108f197724
SHA512b0568c40d96dc4c3672040391fddb1afc5be52823ad460eff67c5335b40ddf7eb42ba8dbfa8bcab0004c8e23e7a51e41162a678c8ec01c6eb785091b0b9f958c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8FZJNG7Q\url.min[1].jsMD5
715749b6973b4268c2993bc2b73f8faa
SHA1405ad2061df73f752ee53623822ebaaec1f89e02
SHA256e3f01a42ab36248bfca392804d39abfc388b3cabb22e0364526cd3e359d92c9d
SHA51275b57a03db3aca77c857bf07ec789ea540603001279508edf4889195eadaae1dd629498d58d62a8ab7ae64669a776a0a44d10f0dd342dc863d9082e08fa4f041
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\QLWO358Y\20b89adb.index-docs[1].jsMD5
df7940b68bc76235b168e9818a083d7c
SHA10041aa296ba2af74215a4e216e4a97ce53be0c9e
SHA256bdf318735c678694796c36cf23354d8f6a8a1476b820d9661a1d782567e880e8
SHA512e56c1b242f6156ae21cf2951d93ed9d9b2e0cbefa401f33e73540fe1672f152dca9f269105028c3e74dce8e0853c051ec973762baacef7daa1f1326c0aa94fe8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\QLWO358Y\8a64e446.index-polyfills[1].jsMD5
c2838dd9c16c1d2d90afcbd2bd542ac5
SHA1d4042ed31a2ffab7d312c66a527851b0bb8ad7a3
SHA256aa7dd71eebadc1039eea7308114eae927fb442b27d701a670db43c5da5b551f2
SHA512df5ad8f7d60ad5b7463192a6fc07310c3b9df443594faead2c9a19cd3da6adea9e58c01775eb9efa37d1024797a61fb45c96d40b9b0af34edd7802e937372faa
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\QLWO358Y\MSDocsHeader-DotNet[1].jsonMD5
04e24d7baa06316c16050577bdf2b6b6
SHA1abfe68c12bc343714c720a5eedcf688f5c5b48bb
SHA256b1b16aae438879c5488552e3d1335ecdc8222099f01342916104f3ab73569885
SHA5126a0894c3669590d6efab6a6d4b7642df5acce37e2513574bfc644841048fd7d507ca01a8898b6999f57fae39d619a8d85bf0ce76de7c63bb8ef2d4d1d0ca9e22
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\QLWO358Y\application-not-started[1].htmMD5
e623ce3b8f8e63499bfbc222c38e28b6
SHA188719ab20e2f39edc712a63d8e169ef5abacfb39
SHA25685801c2f8221d3de26623730ddf28848fcdbb4b1402174d6445b66f4f6475f29
SHA512883d70a11caf61bd107ab235f4c146f3eb167a197fdf50ca9b20b16e6fd7201b24353bf36cab792bad4ad4a1f2eac19e6f36aae6f4263d4095330b82efb1a801
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\QLWO358Y\docons.bec70040[1].woff2MD5
92a04b09b59148e64295c190b4e5a972
SHA1c9cde87e9702254deb06fa3ad70989bd60a0b3fc
SHA256dcd6c821f638cb2c74d46b429339a7ce505d92f776b4f8980f0ed6ac3059fdf5
SHA512d241e4322a45165976d84d303399823e51f9d56b417b483a01cd6932b9d2ba2d98d259a64d4326291241c57d98fe6b1754935db413c92145ccf156e52eda7884
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\QLWO358Y\repair-tool-changes-complete[1].pngMD5
512625cf8f40021445d74253dc7c28c0
SHA1f6b27ce0f7d4e48e34fddca8a96337f07cffe730
SHA2561d4dcee8511d5371fec911660d6049782e12901c662b409a5c675772e9b87369
SHA512ae02319d03884d758a86c286b6f593bdffd067885d56d82eeb8215fdcb41637c7bb9109039e7fbc93ad246d030c368fb285b3161976ed485abc5a8df6df9a38c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\QLWO358Y\repair-tool-no-resolution[1].pngMD5
240c4cc15d9fd65405bb642ab81be615
SHA15a66783fe5dd932082f40811ae0769526874bfd3
SHA256030272ce6ba1beca700ec83fded9dbdc89296fbde0633a7f5943ef5831876c07
SHA512267fe31bc25944dd7b6071c2c2c271ccc188ae1f6a0d7e587dcf9198b81598da6b058d1b413f228df0cb37c8304329e808089388359651e81b5f3dec566d0ee0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VAYNDW20\538a44e8.site-ltr[1].cssMD5
61632459ef4c6128dfec78dfdf4f1d71
SHA1b6ad9021813caac8b4e9874755b15f2125d6d35e
SHA2567875b8e3590378831fe8b00b6897c2458034ff4baf54788d456d62cc1b19e827
SHA512f1a95e923eb3a3161a2f57d6feea5861e265ebb151d861c0b59b1680a052b6ee807ef1f76c243c300241c74d70ccfc5ebb29a3298d49efcaee3a9ff810c7241d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VAYNDW20\MathJax[1].jsMD5
7a3737a82ea79217ebe20f896bceb623
SHA196b575bbae7dac6a442095996509b498590fbbf7
SHA256002a60f162fd4d3081f435860d408ffce6f6ef87398f75bd791cadc8dae0771d
SHA512e0d1f62bae160008e486a6f4ef8b57aa74c1945980c00deb37b083958f4291f0a47b994e5fdb348c2d4618346b93636ce4c323c6f510ab2fbd7a6547359d28d5
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VAYNDW20\TeX-AMS_CHTML[1].jsMD5
a7d2b67197a986636d79842a081ea85e
SHA1b5e05ef7d8028a2741ec475f21560cf4e8cb2136
SHA2569e0394a3a7bf16a1effb14fcc5557be82d9b2d662ba83bd84e303b4bdf791ef9
SHA512ad234df68e34eb185222c24c30b384201f1e1793ad6c3dca2f54d510c7baa67eabdc39225f10e6b783757c0db859ce2ea32d6e78317c30a02d1765aee9f07109
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VAYNDW20\install-3-5[1].pngMD5
f6ec97c43480d41695065ad55a97b382
SHA1d9c3d0895a5ed1a3951b8774b519b8217f0a54c5
SHA25607a599fab1e66babc430e5fed3029f25ff3f4ea2dd0ec8968ffba71ef1872f68
SHA51222462763178409d60609761a2af734f97b35b9a818ec1fd9046afab489aad83ce34896ee8586efe402ea7739ecf088bc2db5c1c8e4fb39e6a0fc5b3adc6b4a9b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VAYNDW20\ms.jsll-3[1].jsMD5
0b1230889098125e3c7d6d85aa92ef91
SHA1233a952d90209cdeb7c4ccd3e8c1385964ad629e
SHA2565b51b335bae4780bd66a60d750a3352388a5fade7d77c17cd3cbe9af62f2af9f
SHA5125e256e80255e5da6631f175e6a9702785a42b2cc2828c35facc54e48275db31f8834b873e01ecb060ae23f9f8a4563080a4c7e5ad13bc387688a259784ff6871
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VAYNDW20\toc[1].jsonMD5
ac44dfb463da3760f074a884d44852bd
SHA10f06bce432d13367c9c7bdbf0b9d9bd15b108d35
SHA256b537e4e15cadf9a3ccc6c8395c79308f43e0d65edbe3ec4b57a32c76ef62c960
SHA512b80f868add3da5b06587686a66f8cfb34853465e08b2d3d3ade0a477ef8ed8b88bb3be8c52de6e5eb70ddaa65c6b04948f999d8b2947d0c92a9e05d1045d6881
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VAYNDW20\wcp-consent[1].jsMD5
38b769522dd0e4c2998c9034a54e174e
SHA1d95ef070878d50342b045dcf9abd3ff4cca0aaf3
SHA256208edbed32b2adac9446df83caa4a093a261492ba6b8b3bcfe6a75efb8b70294
SHA512f0a10a4c1ca4bac8a2dbd41f80bbe1f83d767a4d289b149e1a7b6e7f4dba41236c5ff244350b04e2ef485fdf6eb774b9565a858331389ca3cb474172465eb3ef
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\YDXVG9V9\app-could-not-be-started[1].pngMD5
522037f008e03c9448ae0aaaf09e93cb
SHA18a32997eab79246beed5a37db0c92fbfb006bef2
SHA256983c35607c4fb0b529ca732be42115d3fcaac947cee9c9632f7cacdbdecaf5a7
SHA512643ec613b2e7bdbb2f61e1799c189b0e3392ea5ae10845eb0b1f1542a03569e886f4b54d5b38af10e78db49c71357108c94589474b181f6a4573b86cf2d6f0d8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\YDXVG9V9\bluebird.min[1].jsMD5
8c0479914b7b3b840bf9f62cffe4adaf
SHA1c33559d5f359521e58ed375d6863a2e85a37eadd
SHA256aec354e7dea8b95f5a6242c12dbc66c54d6264795cddf1ce685f59de541cba86
SHA5127c31c0bd521562cc0f6dd604b568267fc217d198daae568b384a49b9cb93e21a27fed0fab3b2a989f3715a864e0f7f867040474799abfa6c344360310caf4c7a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\YDXVG9V9\jsll-4[1].jsMD5
211e123b593464f3fef68f0b6e00127a
SHA10fae8254d06b487f09a003cb8f610f96a95465d1
SHA256589303ca15fba4fe95432dbb456ff614d0f2ad12d99f8671f0443a7f0cf48dff
SHA512dad54d7941a7588675ea9dd11275a60fb6290e1582d1c7a4acb50642af3c2a4aa35e32edd8fa9dd01ce7fd777247d2706d5672a201633bf918b525936e93b14b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\YDXVG9V9\latest[1].woff2MD5
2835ee281b077ca8ac7285702007c894
SHA12e3d4d912aaf1c3f1f30d95c2c4fcea1b7bbc29a
SHA256e172a02b68f977a57a1690507df809db1e43130f0161961709a36dbd70b4d25f
SHA51280881c074df064795f9cc5aa187bea92f0e258bf9f6b970e61e9d50ee812913bf454cecbe7fd9e151bdaef700ce68253697f545ac56d4e7ef7ade7814a1dbc5a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\YDXVG9V9\repair-tool-recommended-changes[1].pngMD5
3062488f9d119c0d79448be06ed140d8
SHA18a148951c894fc9e968d3e46589a2e978267650e
SHA256c47a383de6dd60149b37dd24825d42d83cb48be0ed094e3fc3b228d0a7bb9332
SHA51200bba6bcbfbf44b977129594a47f732809dce7d4e2d22d050338e4eea91fcc02a9b333c45eeb4c9024df076cbda0b46b621bf48309c0d037d19bbeae0367f5ed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\YDXVG9V9\toc[1].jsonMD5
a28215e20ffbe325cf66a2f8bb7773fa
SHA1cea3b2e6a0de05c62dd998b3cfeac9b18c989cb9
SHA256ef1bf49488d0debb427518ccd7f504a5ff0b8910fad80ef2580581e8be94abf5
SHA512976a133600ef8493174bdf5dbbe71d19361ee6f33a055928a3b5da50ce07ee16c16a00887d2e820f1044778670d75287d00c2e16e68700217c1003c40e137e90
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\4S0JJKLN.cookieMD5
4a135b0744c92dca69fe641e1939cd4f
SHA11124cc0f9a5bc4327a7085803d84667834d68b4c
SHA25657ca2fc56e126d63462885e7b79ad5d252d588a077836b863c326b257c7db68d
SHA5126bca35ae38fd1133fef4da99a7f8854fde4f237bb617b3a3ee053718bad13b3953c7bc8e6159235825de6cc044b975b55612afe801a7c8d51f39cae883d3d1cd
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\DYJKOL2A.cookieMD5
008eb7c42f27c11b39d51b29997c199f
SHA1884bd626027fbbf47c5431c967502163bc7ae474
SHA256eb0338ad1f00a89f91e1b6042e844c7695bd1c86c9979eea7a7fc5310bdd6fb7
SHA512d17eab942e4c5f7e1355a197fc81c305269da9c59bd922afa54debf4f3072cba39ddfa1f759478f671bcff98bf5f4b471a7017f06f533c2796d3c86199af0527
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\W9IBEHHK.cookieMD5
2ba92c76f4e41ed98c3eeb650debe223
SHA1554809026be4b6092ef498f989e210b4eeb5e83a
SHA2564735b0bb274497dde7d2e391ba1fbdd6834d17993e9e926fd8a93188fe98d767
SHA512a929598f973c26bc8acd571261845f3faf7616c30e8bac6eefd54b6138cfe5cac653810c3af73bf992b0fd8a131d0020f0ce20f61f168d40704d9e0abbf512bb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\SKRCZEOB\docs.microsoft[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3MD5
189d88609df79b25bf795972556c2867
SHA1219d03e0c029faccd0a9bd4093cbc7bcf661e456
SHA256edad36646c8d4c3e454d22049d76a1ca10a2be28b90c735886842b323b617b59
SHA5121d278f98ce727d22232bcb9cafc27dfb1eaa602d715badd628925e5b83fe85a0fba351f5732ffb2f3c5cf22793e40db24670ef7c40d225e749c8b1733689c7a2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1MD5
0eb42c4e886ba3f2c223d7a1fe627039
SHA163335fa1994ab3c645c0554a3f0e13d1387325eb
SHA256f9cc2045221dfda631943e01c138b82bdd93af2e7ee05055ffb3f3e24262ae77
SHA5123916ee0603566b7af628c8151de2e540fce502b6c2a680f20f045bd65766462684f8cb8d7ba71d7ff1080b3a774ecbbee3cb12a8a64c5eef44037b0f9190f183
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442MD5
a604bbc6b10f720f1a7248965d117d6a
SHA17ec7efc2ae265ce9956ad9df85778b3574f57678
SHA25642ba5b21fd388c920e11ddf428417e81d424dd0f3bc49e180363ad76f5155780
SHA5126a6d9cff545333fa75763d3c6ddcc1f4242112e1adb98c6fd82bc7cdeb09bb7ee3335c83c45d86105b8d10db3dba531b4a1371ad016ddfa14bd0d7e0bc04cf2f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63MD5
ea12dcd72ff76a2e6e7e1482a39eb2ea
SHA1f9254e6897cf0e75d188a0a8437519e8ff06e249
SHA25633f8dffe6aea899455ba65270b6705c16896f23405dd9080e641a1afd23a148a
SHA5124ec2d483c37b6f2b2d4cfa76153be4eb4a532ec545ddbd07d85978d9d73a71c2616d2dfe9e63070abd30366fd8339e2fa4c7c46bd8c49107c8f94ab2b068a3cc
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
e6cbce3b6f198e799413fd1871723399
SHA14975918ed63320b6eee1e1cbecead88eb3e27e95
SHA2568dd6a58af65df30d5c4ddb7f59cceed9d4ac0789e4f562f6d0b647c5c075b812
SHA512f55a9683b51c0f1841679c042e698f16af8a4a8e586c2ea0b74074cf22c1885d30bec2aa9c6dc5112125555e6b7d089e562c1ccacacec546aa7c0ab0d74d5b9c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868MD5
c818d1a2303069fccb29a84353a0e4b9
SHA129cf56b6ca40bc9333728ea3c92b4e2dd8f63087
SHA256ba8bddb399ff54df8d1f560fe3e695d0b0ed072617cb5b485647730e2285e084
SHA512162d75f4a6f07cacfbd457a7b2e01c24d9fe91bf7a77c11f9ec9326a62d6ddcb4c22e848d863311456d065898a7e007f8ed22f4c98f26255c77ee854a84f3252
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABMD5
000b912e1b410dcd8521ee49ea794835
SHA18588523744f24b189b657f4ba2616c7a4870ca03
SHA256ecd01e6fe91a43ab854a668563935a208a867adf74918acb872ab74326436cb7
SHA51246f6713a4b9f21ae58ad99fa5ab67e4c88a9ca1d40b13b827d3a64362378c7cc91625e120d57bddd30089ed1a7c138c9d53d333e93f13044c803edc7f98b49e2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3MD5
d16144389fee1603df5253d100735ad1
SHA1fd065bdb55659f9eb171f974cc389fa1e7613858
SHA2564d7b8e460660beb114064ebb77e8fdfbd9c0bb516544fa033d6781a854f16c67
SHA512b177e623ec1416ba576d98da1c6c5106fc0452693d270b5e74b89792113ef572f246415dda6488ff3922e43468e8f55208d68a3ac12406b205ac13216c8e4cd8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1MD5
1ab3437b8b24024e1de211c28a0dc5ee
SHA1a6d4fbf7218f229e18f00fb2c70fe61a5ce444b7
SHA2567503ab88f71d54ed6efee867b161bd90b0d9393647cc026bea513a464fa689f3
SHA512885cb938e8f7cf6da393ee353370c4aba0f3feee5615bdb9102f07a38956d413fa4a8190ef892eec9efb8fe85b06a0a68cbb49f09d182bac5ba9aa2437c2b482
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442MD5
0a4f65560b12f91c985394a3f951d5a4
SHA103746a16b752799bba004c7617dd8a9cf8f6a668
SHA256004af40c5af5f8f6cb27892119f9cd4c1cd8c21697c911efcb07ee93702bd30c
SHA51209285a7624520b00a7415f495a7d1d60bb0ab29ad6118da8d52bc84e19331178df3d3edbf028f1a709abeb8360e3ab9a1bb2a412b12a51a17592cd5658844a3e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63MD5
79d95c57477a52f09bb2f4cef1195b7e
SHA11de8d8ad998e6db10cc1e1c89c4303b731cf8ba0
SHA25619a95adfdfdfd760a27d210c423933ad4d46ec2b88995d7c463f9844f65b3cb4
SHA51216d809053d34342a80f4a0eea9c9a48de0c03013a2ea40389803cc5b936dff83455ba3f5cd910abb77b593846b3ba17d751179168b5f78cbeb15abb0c649095e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
efd1c19f86a9624d3a9762313eea99fd
SHA140d0f3929613130a08359be26c7ac952f169fa33
SHA256539269d845f14a8a4b395c9bba666bf8a7cad8b52baa742cef8dd01dd7cb8d6b
SHA512a0c867773456abbfbae5a8b3717a6b9bf91453c7c64263092486cae249afccb15fbfb58b623d7758aa7b79be5f4239ab3caa76222e0e38a187c45af1e4c74aac
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868MD5
0ebec7c35031718deaea069847c183d2
SHA1bddc054737b3ea224f9aafc28c2a5a852925b733
SHA2562c3795e64bda14d0081fe4dad918491acf77a35aa938a5658c7f4ca8d901b24f
SHA5129e3d05e255a2e0bd311b7cf74c459d93188291b9b0a4bfde690bc93de6213e861cde5dfa5449429c52ef26af721067479d16b88d613f5abba23e7636d02352d2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABMD5
37dd718c8857160e8cd73dd32dacb669
SHA1f2f7ce0638110623a80b4f9a2a3a3772493faf4e
SHA2560774be99a3b40f0ba1c48c0cb1e58f7943ec5802d4912ac9d91c4e7a00829881
SHA5129d71d4e418d6f2e9aacdbe3860c013aabb7627be9d6daf5c48c2c396561616a8203aad3f92d0478118259675793762ebdbb29f6a4fff213c620e51ec07dc4104
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logMD5
c0eb9c296a5db39b128b2602e61de0b4
SHA1fecc82ba4f54a2140dd8645862200e093752dc45
SHA256bd8dca5c185019b6bc17b5b3e90ee75e505740e83181efb3bf332d329ac6dc9e
SHA51247628131610dcc76749fd05f2de0b654419f87fcde2c44701a7d4c15a67c8d11174f65ea602c464b9b829e878bf5fd21998aaa2f489720c6b4721ffea269369e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chkMD5
7e7514eec03decb0353f47549080e4d5
SHA104a7ba9ebc3e06dc1b3094b3a68b0facca9ecdd6
SHA2565f708950a87372c3ed00f5dcb68dfb666cce057998ebfd08920fcca091cac4bf
SHA512c77e86f8f1d4638d94b93f6469759e9abad81f487c7332911541566219ac37ed952d9ed715713d0faeaeebd6d2bb1db21c928c3f2b8550a70d7807e0f0f9befd
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edbMD5
b71a8d06da94f1bd8d3dbabcede30fd9
SHA113a47a2110e0176a19229b0cc1e0b948790e6cf7
SHA2566797318bbf94cadd59318798a66c0670e4dd1854f628447989aa5b6f65e69508
SHA5125f99faf08b8bb41bd28f1aeb719851a411e4e56f6868ad72bc9a57f2fdf6a05ba08914f66eb0f99b57b9fb56f1bf619fa5f74d3872699d1aa6dabca9168deed5
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfmMD5
94dafdc0ec8e47a72cd4c83f5e2e9309
SHA1e926e48957c13f14552a8de1b9648bee335437b2
SHA256ff750cfefcdac0075d45b5b0616b013aa26d67d6baaaff9a51e5cc8dfe7d6964
SHA512ec8ba7d0a1028a2d4dfcc554db29ab4577f73f7efb9371401fc4b2252657a76f777d31de5787b041a1c41acc5778b76ad8822a9823630c6606da135a7d7c3c0f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{E1C21DC8-74A1-4044-A28E-6B0EDBFDE9A3}.datMD5
02895a6bdd2d98ca1253c03a741072de
SHA17bb2ddfe44ed98494c750fa4f7ac10bba46ba530
SHA256050e2b7c8e1b5bb18975b4f0533ca87c917d0443c3c6928c8deae4044266737a
SHA512b854c681308f4a6fb81ba1f024233e6724a228fef5e4500ad763c5fe15166916b92fbf761aa78bab3ea1c8132ac424e1fd5d8f39573e79550d4b0bec38f63df6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{1FDFB0AF-E279-4975-8C97-5ADCF0E48531}.datMD5
a4153af91f6caac154415bee84212671
SHA1d0120d20dde3e834e1b371e21c0c5761c67b836f
SHA25601267ee6b44036a52e14cccf5e2a41542ef378d845d30af61a23a19bccda90d4
SHA512b0055127ea0fcdebd3c626e9530c15030c7a7871589c6b9514f6d0ddca2eb30e2a1936b4b9cfb42fcb938b734450827d9a36ccda4369fdab1f02c1c7a5126b2d
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
57c7d195a177757bfcf67886fd7c170c
SHA164187068dae395acd2bed9dd6c42d10bddebaa98
SHA25635780c2a4ec8203bb8fce796654f77d441ff9196851ccea72f9c207b22f51382
SHA512270f1fffa624530ba45c2bd6b55e66b2a07680331f85d9f0d2d2502f9bd2bac83f92fdf968dd05170a9c02d38783fb8bef0b484f28f1c919680ec6ab3c324d7b
-
C:\Users\Admin\AppData\Roaming\Remcos\svchosts.exeMD5
4831c6d14c3a2135226c3e581bb4013f
SHA144a2ce6196d4467b6ae78a625d346f9008935630
SHA256311e25c8370ed1c16a72cf163c48090f3e73495bc5fbc3a824635e9cc62f70e1
SHA512c06db0e8e11f9d185f73a0e3786bc4b94904c532c3af50be0badc983d48b7aa66dec429e25de755bcfeadf371e48843f6531024acbd32afca9970991bc57da30
-
C:\Users\Admin\AppData\Roaming\Remcos\svchosts.exeMD5
4831c6d14c3a2135226c3e581bb4013f
SHA144a2ce6196d4467b6ae78a625d346f9008935630
SHA256311e25c8370ed1c16a72cf163c48090f3e73495bc5fbc3a824635e9cc62f70e1
SHA512c06db0e8e11f9d185f73a0e3786bc4b94904c532c3af50be0badc983d48b7aa66dec429e25de755bcfeadf371e48843f6531024acbd32afca9970991bc57da30
-
C:\Users\Admin\AppData\Roaming\Remcos\svchosts.exeMD5
4831c6d14c3a2135226c3e581bb4013f
SHA144a2ce6196d4467b6ae78a625d346f9008935630
SHA256311e25c8370ed1c16a72cf163c48090f3e73495bc5fbc3a824635e9cc62f70e1
SHA512c06db0e8e11f9d185f73a0e3786bc4b94904c532c3af50be0badc983d48b7aa66dec429e25de755bcfeadf371e48843f6531024acbd32afca9970991bc57da30
-
memory/1168-216-0x00000000004DF6CE-mapping.dmp
-
memory/1216-125-0x0000000000413FA4-mapping.dmp
-
memory/1216-126-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1216-124-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1916-149-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1916-144-0x0000000000413FA4-mapping.dmp
-
memory/2548-130-0x0000000000000000-mapping.dmp
-
memory/2548-139-0x0000000007DA0000-0x0000000007DA1000-memory.dmpFilesize
4KB
-
memory/3620-146-0x0000000000400000-0x00000000004E4000-memory.dmpFilesize
912KB
-
memory/3620-147-0x00000000004DF6CE-mapping.dmp
-
memory/3888-129-0x0000000000000000-mapping.dmp
-
memory/4024-121-0x0000000004CB0000-0x0000000004CBE000-memory.dmpFilesize
56KB
-
memory/4024-119-0x0000000007A90000-0x0000000007A91000-memory.dmpFilesize
4KB
-
memory/4024-114-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/4024-123-0x00000000066D0000-0x0000000006710000-memory.dmpFilesize
256KB
-
memory/4024-122-0x00000000054D0000-0x0000000005559000-memory.dmpFilesize
548KB
-
memory/4024-116-0x0000000007F00000-0x0000000007F01000-memory.dmpFilesize
4KB
-
memory/4024-120-0x000000000B140000-0x000000000B141000-memory.dmpFilesize
4KB
-
memory/4024-117-0x0000000007AE0000-0x0000000007AE1000-memory.dmpFilesize
4KB
-
memory/4024-118-0x00000000076B0000-0x00000000076B1000-memory.dmpFilesize
4KB
-
memory/4032-127-0x0000000000000000-mapping.dmp
-
memory/4172-153-0x00000000004DF6CE-mapping.dmp
-
memory/4308-222-0x00000000004DF6CE-mapping.dmp
-
memory/4536-200-0x00000000004DF6CE-mapping.dmp
-
memory/5496-228-0x00000000004DF6CE-mapping.dmp